In this article by Peter Ward, Peter Abreu, Pavlo Andrushkiw, Pat Esposito, Jeff Gellman, and Joel Plaut, the authors of Microssoft SharePoint 2013 Diaster Recovery Guide, explains data prevention and recovery procedures that should be applied by users with their SharePoint collaboration activities to prevent data loss.
The reader of this article is probably technical, and therefore perhaps a little surprised by the title and the topic of this article. You probably assume that DR is an IT department activity, so why should the end user even think about it?Read Disaster Recovery Techniques for End Users in full
One thing that is certain in computing is that hardware will fail even if the software is written soundly. For this reason, a disaster recovery plan should be implemented for every database server. Even if you are not the administrator of the server, this article will show you how to back up the data you use.
In this article, Albert Lukaszewski, PhD, author of MySQL for Python, we will have covered:
- When to implement one of several kinds of database backup plans
- What methods of backup and disaster recovery MySQL supports
- How to use Python to back up databases
The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability and elasticity, bringing everything you need to create, manage and build the core components of a Microsoft Private Cloud for virtualized workloads.
In this article by Leandro Cavalho, the author of Windows Server 2012 Hyper-V Cookbook, we will cover the following topics:
Backing up Hyper-V and virtual machines using Windows Server Backup
Restoring Hyper-V and virtual machines using Windows Server Backup
Confguring Hyper-V Replica between two Hyper-V hosts using HTTP authentication
Confguring Hyper-V Replica broker for a Failover Cluster
Confguring Hyper-V Replica to use certificate-based authentication using an Enterprise CA
Using snapshots in virtual machines
This is the second part of the 2 series article by Sitaraman Lakshminarayanan on Digitally Signing and Verifying Messages in Web Services using Oracle.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part explained concepts like digital signatures,their importance,their functional use with respect to web services, but mainly focussed on how Oracle Web Services Manager can help generate and verify signatures in web services.In the this part,he explain signature generation and signature verification along with an example. For all those who missed out the initial action just click onto : http://www.packtpub.com/article/digitally-signing-and-verifying-messages-web-services-part1Read Digitally Signing and Verifying Messages in Web Services ( part 2 ) in full
This is a two article series by Sitaraman Lakshminarayanan.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part will explain concepts like digital signatures,their importance,their functional use with respect to web services, but will mainly focus on how Oracle Web Services Manager can help generate and verify signatures in web services.In the next part,he will explain signature generation and signature verification along with an example.Read Digitally Signing and Verifying Messages in Web Services ( part 1 ) in full
A Windows Azure hosted service may comprise multiple instances of multiple roles. These instances all run in a remote Windows Azure data center—typically 24*7. The ability to monitor these instances non-intrusively is essential both in detecting failure and in capacity planning. This article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, shows how Windows Azure Diagnostics provides for the non-intrusive capture of diagnostic data and its subsequent persistence to the Windows Azure Storage Service. Windows Azure Diagnostics supports various standard sources, allowing for their extensibility where appropriate. The topics covered in this article include:
- Using the Windows Azure Diagnostics trace listener
- Performing an on-demand transfer
- Implementing custom logging
- Accessing data persisted to Windows Azure Storage
- Using the Windows Azure Platform
- PowerShell cmdlets to configure Windows Azure Diagnostics
In this article by Edward Callahan, author of Easy Web Development with WaveMaker, we will examine the WaveMaker application architecture. We will learn about the client, the server, how they are constructed, and some of the core features available to us in each. We'll examine the HTTP requests made to the server and examine the JSON request of a database read call. We'll also learn about typing in WaveMaker. We'll finish this article with a tour of the Studio WaveMaker application. By the end of this article, you will have learned about:
- The client framework
- The server architecture
- Communications between client and server
- Application file structure
This article will help us learn about the different ways of running Squid and the available options that can be passed to Squid from the command line. We will also learn about debugging the Squid configuration file.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will learn the following:
- Various command line options for running Squid
- Parsing the squid configuration file for syntax errors
- Using an alternate squid configuration file for testing purposes
- Different ways of starting Squid
- Rotating log files generated by Squid
NHibernate is an open source object-relational mapper, or simply put, a way to rapidly retrieve data from your database into standard .NET objects.
In this article by Aaron B. Cure, Author of NHibernate 2 Beginner's Guide, we will learn how to glue tables and classes that hold our data in the applicationRead Different types of Mapping in Nhibernate 2 in full
In this article written by Cory Simmons, the author of the book Instant Responsive Web Design provides you with all the information you need to start building responsive, mobile-friendly websites today.
Since Ethan Marcotte coined the term "responsive web design", people have been looking for the best way to do it, which has cumulated into the Goldilocks approach versus the Fluid approach, and Desktop-first versus Mobile-first. The only right answer is to do what you're most comfortable with and, as always, avoid dogma. In this section we'll go over the differences between each approach and even sample them so your RWD tool belt is well equipped.Read Different strategies to make responsive websites in full
This article written by Chandru Shankar, Vincent Bellefroid, and Nilesh Thakkar, the authors of the book Customer Success with Microsoft Dynamics Sure Step discusses the activities and covers in detail the Decision Accelerator Offerings that help to accelerate the sales cycles and bring them to a close while also helping the customer with their due diligence process.Read Diagnostic leveraging of the Accelerated POC with the CRM Online service in full
In this article by Michael Badger, we will go through the process of discovering and modeling devices to build an inventory of the network.
We'll start this article by fine tuning our device inventory through manually adding devices to our inventory. Then we'll take a look at the main device status view and perform some routine device administration tasks. The second half of the article demonstrates the available monitoring protocols that Zenoss uses to model the devices.
We'll continue to demonstrate features using the Mill Race network, but feel free to substitute your own devices in the examples given in this article. By the time we finish this article, we'll have a detailed model of our networks.Read Device Management in Zenoss Core Network and System Monitoring: Part 1 in full
The primary focus of Pluggable Authentication Module (PAM) is to authenticate your users. PAM lets you set up the environment that the users will work in. And when the users log out, PAM tears down the working environment in a controlled way. PAM and PAM-aware applications reduce the complexity of authentication. Application programmers can take advantage of PAM, rather than developing a complete set of authentication functions. In this article by Kenneth Geisshirt, we will see how an application uses PAM for authentication and how to develop our own PAM modules.Read Development with Pluggable Authentication Modules (PAM) in full
A Windows Mobile is a Smart Phone with Windows Operating System. Windows OS in Windows Mobiles is the Compact Edition (CE) of the desktop Windows OS. This article will introduce you to writing Windows Mobile Applications using Visual C# and Microsoft Visual Studio 2008. This article by Prashant Thakkar will address:
- Essential features of Microsoft Visual Studio 2008 IDE that help in writing Windows Mobile Application.
- Writing your first Windows Mobile "Hello World" application and a "Quote of the Day" Application that uses Internet
- Packaging, Deploying and running your Windows Mobile Applications
Ruby on Rails is an active component in the world of web application framework. Ruby is the language used and Ruby on Rails is the framework built upon Ruby. In this article by A.P.Rajshekhar, we will be learning how to develop the login management module and the comment management module .We will start off by creating a login page and then move to implementing the Authenticate method, set up the session, try out applying authorization. After this, we will learn generating the Scaffold, modifying the model, review the View, customizing the controller under the development of comment management module sub title.Read Development of Login Management Module and Comment Management Module in full
In this article by Pawan Sachdeva, we will be introduced to the various features of the iPhone along with basic programming for its development. We will develop a "Hello World" program to highlight its ability to be programmed.Read Development of iPhone Applications in full