Article Network

Troubleshooting Storage Contention

by Mike Preston | November 2013 | Enterprise Articles

This article written by Mike Preston, the author of the book Troubleshooting vSphere Storage, identifies storage contention and performance issues.

Read Troubleshooting Storage Contention in full

Troubleshooting WebSphere Security-related Issues

by Omar Siliceo | August 2011 | Enterprise Articles IBM

It is not uncommon to run into issues when global security is first enabled in a WebSphere environment. Some of those situations may occur due to performing tasks out of order. Other problematic conditions related to security configuration may take place due to inadvertently omitting one or more steps in a set up process. Moreover, a third category of errors that may happen due to security configuration is caused by using the wrong values to one or more parameters.

In the previous article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, we took a look at tuning websphere security. In this article we will be presented by a set of some conditions that may appear in a WebSphere Application Server ND version 7 (WAS ND7) when global security is first enabled. The first subsection covers circumstances that may come about during the configuration phase. Next, a subsection is included that presents circumstances that may happen at runtime.

Read Troubleshooting WebSphere Security-related Issues in full

Troubleshooting your BAM Applications

by Pete Wang | November 2012 | SOA Oracle

In a typical business flow in BAM, business data moves from various upstream data sources to Oracle BAM, which internally processes and pushes the data to IE browsers for report rendering. As different technologies and BAM Server components are involved, it could be time-consuming and challenging to identify and solve the problem if anything goes wrong in this flow.

In this article by Pete Wang , author of Oracle BAM 11gR1 Handbook, we will cover:

  • Methodologies for troubleshooting Oracle BAM
  • Troubleshooting Active Data processing
  • Troubleshooting BAM HA issues
Read Troubleshooting your BAM Applications in full

Troux Enterprise Architecture: Managing the EA function

by Richard J. Reese | August 2010 | Architecture & Analysis Enterprise Articles

This article by Richard J. Reese, author of the book Troux Enterprise Architecture Solutions, explores an aspect of Enterprise Architecture that is not written about a great deal. There are as many models for running the EA function as there are opinions about the topic. This article provides a brief introduction to the following topics:

  • Setting the EA charter
  • Staffing the function
  • Sample job descriptions
  • Management metrics

These topics are provided as representative samples of how the EA function can be managed within a business or agency. There is no "best way" to organize the EA function. There are, however, some management principles that have worked well for many organizations, and these are presented next.

Read Troux Enterprise Architecture: Managing the EA function in full

Trunks in FreePBX 2.5

by Alex Robar | September 2009 | Linux Servers Networking & Telephony Open Source

In this article by Alex Robar, we will learn about trunks in FreePBX. We will discuss the following:

  • Various types of trunks allowed by FreePBX
  • Methods for setting up each type of trunk
Read Trunks in FreePBX 2.5 in full

Trunks using 3CX: Part 1

by Matthew M. Landis Robert Lloyd | February 2010 | Networking & Telephony

If you have a working phone system with extensions, voicemail, digital receptionists, call queues, and several other features and you want to call home or have a customer call you, what will you do? For that, you need to connect 3CX outside your internal network. This connection is called as trunk. In this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial, we will cover:

  • PSTN trunks
  • SIP trunks
  • Introduction to dial plans
  • Hardware needed for analog lines
Read Trunks using 3CX: Part 1 in full

Trunks using 3CX: Part 2

by Matthew M. Landis Robert Lloyd | February 2010 | Networking & Telephony

Read Part One of Trunks using 3CX here.

Read Trunks using 3CX: Part 2 in full

Tuning WebSphere Security

by Omar Siliceo | August 2011 | Enterprise Articles IBM

The generic term "tuning security … " some say, it's an oxymoron. Why so? Well, in many cases, tightening up security is normally reflected in poor performance. So, if a portion of your environment is performing poorly, it may need a review of the security configuration in order to see if loosening it a bit does not compromise the environment itself. This article by Omar Siliceo, author of IBM WebSphere Application Server v7.0 Security, briefly describes tuning in three major areas:

  • General security configuration
  • CSIv2 connectivity
  • LDAP and Web authentication
Read Tuning WebSphere Security in full

Turning your PowerPoint presentation into a Prezi

by Domi Sinclair | April 2013 | e-Learning Open Source

Moving to Prezi doesn't have to mean abandoning all the hard work you've put into perfecting your PowerPoint slides. That work is still useful, as you can import your PowerPoint into Prezi. This is a good starting point as it allows you to rework your familiar content.

This article by Domi Sinclair, author of Instant Prezi for Education How-to takes you through the steps to creating more engaging presentations using Prezi.

Read Turning your PowerPoint presentation into a Prezi in full

Tweet for your free LITE eBook

by | January 2012 | Enterprise Articles Open Source

Here at Packt, we've decided to do something quite funky. Rather than paying for a book, we figured, 'why not just ask for a tweet instead?'

So, hit the 'Pay with a tweet' button above, and we’ll give you a code that entitles you to a FREE eBook from our LITE series. Any LITE book you like. Want to know more about Oracle Database Utilities? How about a bit of Unity game development? It's up to you!

 

Read Tweet for your free LITE eBook in full

Type, Subtype, and Category Patterns in Logical Data Modeling

by Djoni Darmawikarta | December 2008 | Architecture & Analysis

Your application and its database certainly deal with things of significance to your organization that you care to computerize, automate some of their aspects, and to store data about them. Product and services are examples of these things—the fundamental aspects that any organization must take care of.

This article by Djoni Darmawikarta introduces three patterns for modeling: Type, Subtype, and Category. These three logical data modeling patterns are common structures applicable to any kind of organization.

Read Type, Subtype, and Category Patterns in Logical Data Modeling in full

Types of services in Microsoft Dynamics AX 2012

by Kenny Saelen Klaas Deforche | February 2013 | Enterprise Articles Microsoft

Microsoft Dynamics AX 2012 already provides a number of services out-of-the-box. These services together with additional services that can be developed can be divided into three types. Each of the service types has its own characteristics and a different approach to create them.

This article by Klaas Deforche and Kenny Saelen authors of Microsoft Dynamics AX 2012 Services discusses about these services in detail.

Read Types of services in Microsoft Dynamics AX 2012 in full

TYPO3 for Connecting External APIs: Flicker and Youtube

by Dan Osipov | January 2010 | MySQL Content Management Open Source PHP

In this article by Dan Osipov, we will see how external services specifically Flickr and YouTube, can be leveraged to expand the system. We pull in files from YouTube and Flickr.

Read TYPO3 for Connecting External APIs: Flicker and Youtube in full

Ubuntu 9.10: How To Upgrade

by Christer Edwards | November 2009 | Linux Servers Open Source

In this article by Christer Edwards, you'll learn a number of different ways to upgrade an existing Ubuntu installation. Whether it is a Desktop, Laptop or Server, you'll find instructions below. These methods have been tested by volunteers around the world and should prove to be simple and problem free for you as well.

Read Ubuntu 9.10: How To Upgrade in full

Ubuntu Features

by Christer Edwards | October 2013 | Linux Servers Open Source

In this article, by Christer Edwards, the author of Instant Ubuntu, we learn about different features you need to know about that helps you discover much of the software Ubuntu provides and learn how to use it. You will learn about different accessories of Ubuntu, how to customize Ubuntu, and also about some games you can play in Ubuntu.

Read Ubuntu Features in full

Ubuntu Server and WordPress in 15 Minutes Flat

by Christer Edwards | September 2010 | Linux Servers Open Source Web Development WordPress

This article by Christer Edwards outlines how to install Ubuntu Server from scratch, install and configure the LAMP (Linux Apache MySQL PHP) packages and get the Wordpress blogging software installed and configured in under 15 minutes. It may take more than that time to initially read the article, but after you've given it a once-over and have the required components ready, you'll be able to install a machine from scratch and have your own blog up and running in 15 minutes!

Read Ubuntu Server and WordPress in 15 Minutes Flat in full

Ubuntu User Interface Tweaks

by Christer Edwards | August 2009 | Linux Servers Open Source

One of the greatest things about a Linux based Desktop environment is the ability to customize nearly everything you see. In this article by Christer Edwards, we will see how to find hidden UI options as well as save all of your customizations for easy replication. By the end of this article you'll know how to automate (script) the customization of your desktop down to the very last detail.

Read Ubuntu User Interface Tweaks in full

UDP/TCP Analysis

by Yoram Orzach | December 2013 | Architecture & Analysis Cookbooks Networking & Telephony Open Source

In this article by Yoram Orzach, the author of Network Analysis Using Wireshark Cookbook, covers the following recipes:

  • Configuring TCP and UDP preferences for troubleshooting
  • TCP connection problems
  • TCP retransmissions – where they come from and why
Read UDP/TCP Analysis in full

UDP/TCP Analysis

by Yoram Orzach | December 2013 | Architecture & Analysis Cookbooks Networking & Telephony Open Source

In this article by Yoram Orzach, the author of Network Analysis Using Wireshark Cookbook, covers the following recipes:

  • Configuring TCP and UDP preferences for troubleshooting
  • TCP connection problems
  • TCP retransmissions – where they come from and why
Read UDP/TCP Analysis in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software