This article by Alfonso Romero, teaches you about all the different tools available on the Internet that can help you build a very attractive weblog for your visitors. You'll learn how to upload files to your blog and use the Rich Text Editor to insert images.Read Spicing Up Your Blog: Uploading Files and Images to your Weblog using Apache Roller in full
In the previous discussion, the focus was on understanding the Model, View and Controller components of the application using Spring MVC framework. However, the developed components do not have knowledge of each other. Model is passed through Controller to the View using Logical View name. We have yet to map Logical View to the physical file. Also, to deploy the application, the application itself needs to be configured so that the Application Server knows to which component it should the route the requests. In this article by A. P. Rajshekhar, the focus will be on these two steps – configuring the components as well as configuring and deploying the application.Read Spring MVC - Configuring and Deploying the Application in full
Spring Roo is an easy-to-use tool for rapidly developing Java enterprise applications using well-recognized frameworks such as Spring, Hibernate, AspectJ, Spring Web Flow, Spring Security, GWT, Flex, and so on. Spring Roo takes care of creating project structure for your enterprise application, adding support to use Maven for building and deploying the application, creating application architecture based on your choice of technologies, creating unit and integration tests based on your choice of testing framework, and so on.
In this article by Ashish Sarin, author of Spring Roo 1.1 Cookbook, we'll look at how Spring Roo simplifies developing the web layer of an enterprise application using Spring Web MVC. We'll also look at how Spring Roo lets us quickly test our web application locally.Read Spring Roo 1.1: Working with Roo-generated Web Applications in full
Spring Security exists to fill a gap in the universe of Java third-party libraries, much as the Spring Framework originally did when it was first introduced. Standards such as Java Authentication and Authorization Service (JAAS) or Java EE Security do offer some ways of performing some of the same authentication and authorization functions, but Spring Security is a winner because it packages up everything you need to implement a top-to-bottom application security solution in a concise and sensible way. Additionally, Spring Security appeals to many because it offers out of the box integration with many common enterprise authentication systems; so it's adaptable to most situations with little effort (beyond configuration) on the part of the developer.
This article will provide you with a few tips and tricks on Spring Security.Read Spring Security 3: Tips and Tricks in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords
This article discusses the basic concepts and knowledge needed to use SQL query in SAP Business One. You will learn a clear definition of SQL query, the data dictionary, and table links.
In this article by Gordon Du, author of Mastering SQL Queries for SAP Business One, we will begin by identifying the target audience, and will then go on to discuss the basic concepts and knowledge needed to use SQL query in SAP Business One. In the first section, you will be given a clear definition of the specific scope of the SQL and Query. The following section discusses the Data Dictionary and table links such as base tables versus target tables. The last section gives you a key concept to remember for building a good query by keeping it simple.Read SQL Query Basics in SAP Business One in full
SQL Server 2008 R2 improves the ability to manage multiple servers centrally with Utility Control Point (UCP). In order to manage multiple instances efficiently, there are certain settings available within the Utility Explorer tool. In this recipe by Satya Shyam K Jayanty, author of Microsoft SQL Server 2008 R2 Administration Cookbook, we will focus on how to manage multiple instances using Utility Explorer by setting global policies for data-tier applications (DAC), and managed instances.Read SQL Server 2008 R2: Multiserver Management Using Utility Explorer in full
In this article, by Baya Dewald, one of the three authors of the book SQL Server Analysis Services 2012 Cube Development Cookbook we will cover:
- SSAS instance con figuration options
- Creating and dropping databases
- Monitoring SSAS instance using Activity Viewer
- Monitoring SSAS instance using DMVs
- Cancelling a session
- Checking whether cubes are accessible
- Checking SSAS object sizes programmatically
- Backup and restore
- Detaching and attaching databases
This article by Donabel Santos author of SQL Server 2012 with PowerShell V3 Cookbook, demonstrates scripts and snippets of code that accomplish some basic SQL Server tasks, using PowerShell. We will start with simple tasks, such as listing SQL Server instances and creating objects such as tables, indexes, stored procedures, and functions, to get you comfortable with working with SQL Server programmatically.
You will find that many of the recipes can be accomplished using PowerShell and SQL Management Objects ( SMO). SMO is a library that exposes SQL Server classes, which allows for programmatic manipulation and automation of many database tasks. For some recipes, we will also explore alternative ways of accomplishing the same tasks, using different native PowerShell cmdlets.
Even though we are exploring how to create some common database objects using PowerShell, I would like to note that PowerShell is not always the best tool for the task. There will be tasks that are best left accomplished using T-SQL. Even so, it is still good to know what is possible with PowerShell and how to do it, so that you know you have alternatives depending on your requirements or situation.Read SQL Server and PowerShell Basic Tasks in full
In this article by Debarchan Sarkar, the author of Microsoft SQL Server 2012 with Hadoop, we will learn how to create an SQL Server Integration Services package to move data from Hadoop to SQL Server using the Hive ODBC driver.
Microsoft SQL Server is a complete suite of tools that include an RDBMS system, a multidimensional OLAP and tabular database engines, as well as other services, for example a broker service, a scheduling service (SQL Agent), and many more. As discussed it has become extremely important these days to integrate data between different sources. SQL Server also offers a powerful business intelligence stack, which provides rich features for data mining and interactive reporting. One of these BI components is an extract, transform, and load (ETL) tool called SQL Server Integration Services (SSIS). SSIS offers the ability to merge structured and un-structured data by importing Hive data into SQL Server and apply powerful analytics on the integrated data. Throughout the rest of this article, we will get a basic understanding on how SSIS works and create a simple SSIS package to import data from Hive to SQL Server.Read SQL Server Integration Services (SSIS) in full
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will have a look at how proxy servers and web caching works in general. We will proceed to download the correct Squid package for our operating system, based on the system requirements that we learned about in the Preface. We will learn how to compile and build additional Squid features. We will also learn the advantages of compiling Squid manually from the source over using a pre-compiled binary package.
In the final section, we will learn how to install Squid from a compiled source binary package, using popular package managers. Installation is a crucial part in getting started with Squid. Sometimes, we need to compile Squid with custom flags, depending on the environment requirements.Read Squid Proxy Server 3: Getting Started in full
Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. Though we may take utmost care while configuring Squid and testing everything before deploying changes in production mode, sometimes we may face issues which can affect our clients. The issues may be a result of configuration glitches, Squid bugs, operating system limitations, or even because of the network issues.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will discuss some debugging problems which we may come across while configuring or running Squid.Read Squid Proxy Server: Debugging Problems in full
Whether you only run one site, or are in charge of a whole network, Squid is an invaluable tool which improves performance immeasurably. Caching and performance optimization usually requires a lot of work on the developer's part, but Squid does all that for you. In this article we will learn to fine-tune our cache to achieve a better HIT ratio to save bandwidth and reduce the average page load time.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will take a look at the following:
- Cache peers or neighbors
- Caching the web documents in the main memory and hard disk
- Tuning Squid to enhance bandwidth savings and reduce latency
Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. System administrators often struggle with delays and too much bandwidth being used, but Squid solves these problems by handling requests locally. By deploying Squid in accelerator mode, requests are handled faster than on normal web servers, thus making your site perform quicker than everyone else's!
Applying proxy servers to large networks can be a lot of work as you have to decide where to place restrictions and who to grant access. This article will provide you with some tips and tricks on Squid Proxy server to enhance the performance of your network.Read Squid Proxy Server: Tips and Tricks in full
Microsoft SQL Server Integration Services 2008 (SSIS) is a full service Extract, Transform, and Load (ETL) program tightly integrated with SQL Server 2008 with a Rapid Application Development (RAD) user interface. Microsoft SQL Server Reporting Services 2008(SSRS) is a third generation reporting program that is also tightly integrated with SQL Server 2008, which hosts the Report Server providing full support with a web service frontend for a variety of reporting needs—from web-based reporting to embedded reporting.
In this article by Jayaram Krishnaswamy, author of Microsoft SQL Azure Enterprise Application Development, we will be leveraging SSIS, SSRS, and the tools used to address ETL processes, and Report authoring with SQL Azure as the source of data. We will be looking at the following data-related items in some detail:
- Moving a MySQL database to SQL Azure database
- Creating a report using SQL Azure as data source
- Accessing SQL Azure from Report Builder 3.0
This article, given by Chamil Madusanka, the author of Visualforce Developer's Guide, covers a set of instructions that can react on the user's interaction with Visualforce markup (for example, a button click or a link click) is called as a controller. A controller can control the behavior of a page and it can be used to access the data which should be displayed on the page. This article covers what are standard controllers.Read Standard Controllers in full
In this article by Murat Yilmaz, author of OpenX Ad Server: Beginner's Guide, we will start our first campaign and show the first banner as fast as we can by using the minimum settings of OpenX Ad Server.
In this article we shall:
- Define an advertiser
- Create a campaign and banner
- Define a website and zone on this website
- Link the banner to this zone
- Serve this banner on this website zone by using a web page
Read Start Ad Serving with OpenX here.Read Start Ad Serving with OpenX- A Sequel in full
This article by Alexander Papaspyrou, the author of Instant Google Compute Engine provides you with all the information you need to run your large-scale computing workloads on Linux virtual machines hosted on Google's infrastructure. You will also get to know the basic building blocks of Google Compute Engine (GCE), get started with creating and running your infrastructure in the Cloud, and learn about the different concepts that make up a well-performing GCE system.Read Starting an instance in full
In this article, by Felix Kerger, author of Ogre 3D 1.7, we will cover:
- Adding resources
- Using resources.cfg
- Structure of a configuration file
- Creating an application class
- Adding a FrameListener
- Investigating the FrameListener functionality