public marks

PUBLIC MARKS from BlueVoodoo

10 March 2008

Java, Web Service, and database apps with Rational App. Developer v7

Get an overview of Rational Application Developer V7 in this basic tutorial, which includes demos and hello world exercises. This tutorial includes practical exercises that show how to create a Java application, create and invoke a Web service, and create a Web application that can access a Derby database using a Relational Record List.

07 March 2008

Changing UIDs and GIDs without harming your server

It's important to know what happens to file ownership in AIX once you make a UID or GID change. If you don't understand the results of altering a UID or GID, you could cause serious issues to your server and environment.

06 March 2008

Stick a fork in it: Java ParallelArray

In this article, discover the ParallelArray classes, which simplify parallel sorting and searching operations on in-memory data structures in Java 7. Be sure to check out the first part of the series for further instruction.

05 March 2008

Understand your Domain Name System

by 1 other
The Domain Name System (DNS) is the service that converts hostnames and domain details into the IP addresses required for application to communicate. This article looks at the basics of DNS setup, how servers and requests are distributed, and exchanged and how to set up and keep a DNS environment running smoothly.

04 March 2008

Rational ClearCase Innovator’s Series eKit

With transparent real-time access to files and directories and sophisticated branching and graphical merge tools, Rational ClearCase can help you automate manual error prone processes, collaborate with your teams without sacrificing individuality and stay flexible in the way you work while developing better software, faster.

03 March 2008

IBM Enterprise Modernization Sandbox for System Z

These sandboxes make it easy and fun to quickly try practical scenarios guided by self-paced exercises. Leverage existing assets, architectures, and skills to quickly develop modern applications for System z, System i, and distributed platforms. You can also integrate, test, and deploy applications in a live test environment.

29 February 2008

Configure HTTP basic authentication with Rational

This second installment in the three-part series shows you how to configure HTTP basic authentication for your Web services and Web services client, and monitor the HTTP basic authentication information using the TCP/IP monitor. Check out the first part of there series for the initial steps.

28 February 2008

Get the most out of Z Shell

Examine key parts of the Z shell (zsh) and how to use it's features to ease your UNIX system administration tasks. zsh is a popular alternative to the original Bourne and Korn shells. It provides an impressive range of additional functionality, including improvements for completing different commands, files, and paths automatically, and for binding keys to functions and operations.

27 February 2008

Keep an eye on your system with Log File Basics

A typical UNIX or Linux machine creates many log files during the course of its operation. Some of these contain useful information; others can be used to help you with capacity and resource planning. This article looks at the fundamental information recorded within the different log files, their location, and how that information can be used to your benefit to work out what is going on within your system.

26 February 2008

SSL configuration for Tivoli Directory Server 6.0

Gain an overview of SSL configuration for IBM Tivoli Directory Server (ITDS) 6.0 on the AIX 5L operating system. Learn about command line configuration steps for SSL key database creation, certificate creation, certificate extraction, SSL authentication mechanisms, troubleshooting for SSL issues, and steps to perform LDAP client-server communication.

25 February 2008

Learn 10 good UNIX usage habits

Adopt 10 good habits that improve your UNIX command line efficiency - and break away from bad usage patterns in the process. This article takes you step-by-step through several good, but too often neglected, techniques for command-line operations. Learn about common errors and how to overcome them, so you can learn exactly why these UNIX habits are worth picking up.

22 February 2008

Understand Scala’s class syntax and semantics

In this second installment of The busy Java developer's guide to Scala series, learn a basic premise of language measurement: that the power of a language can be measured in direct relation to its ability to integrate new facilities -- in this case, support for complex numbers. Along the way you'll see some interesting tidbits related to class definitions and usage in Scala.

21 February 2008

Support AIX functionality with LDAP servers

Some platforms may lose their operating system-specific functionality due to the lack of schema support from the LDAP server. This article presents a solution for some non-IBM LDAP servers to support full AIX user management functionality by providing the AIX schema for these server types and the steps to update these LDAP server types with the schema.

20 February 2008

Protecting JSF applications with Acegi

This article first explains the features Acegi provides for this purpose and dispels some common misconceptions about using Acegi with JSF, then presents a simple web.xml file that you can use to deploy Acegi to secure a JSF application.

19 February 2008

Build your own memory manager for C/C++ projects

As a developer, one of the most powerful tools that C/C++ arms you with to improve processing time and prevent memory corruption is the control over how memory is allocated or deallocated in your code. This tutorial demystifies memory management concepts by telling you how to create your very own memory manager for specific situations.

18 February 2008

Get started with GAWK: AWK language fundamentals

Discover the basic concepts of the AWK text-processing and pattern-scanning language. This tutorial gets you started programming in AWK: You'll learn how AWK reads and sorts its input data, run AWK programs, manipulate data and perform complex pattern matching. When you're finished, you'll also understand GNU AWK (GAWK).

15 February 2008

How to setup and work with secure RPC with AIX 5.3

Find out how to use Secure RPC using Data Encryption Standard (DES) authentication on AIX 5.3 to achieve a secure communication between the client and server. In this article, you'll examine the setup required to initiate Secure RPC between the client and server, DES authentication, and how to make applications secure using the Secure RPC application programming interfaces (APIs).

14 February 2008

Transition to AIX from Solaris

Need to know how to work with partitioning and virtualization? Want to know the differences between WPARs and zones and how the process differs from creating zones and WPARs? Have your questions addressed with this article and make your transition easier.

13 February 2008

Mastering Grails: GORM: Funny name, serious technology

Any good Web framework needs a solid persistence strategy. In this second installment of his Mastering Grails series, Scott Davis introduces the Grails Object Relational Mapping (GORM) API. See how easy it is to create relationships between tables, enforce data validation rules, and change relational databases in your Grails applications.

12 February 2008

Theory and Practice of Ropes for Java String Manipulations

Systems that manipulate large quantities of string data are poorly served by the Java language's default String and StringBuilder classes. A rope data structure can be a better alternative. This article introduces Ropes for Java, a rope implementation for the Java platform; explores performance issues; and provides pointers for effective use of the library.

11 February 2008

Project and Portfolio Management Executive Resource Kit

Portfolio Management is about effectively managing portfolio value by aligning portfolio investments with business goals. This article provides insights and ideas around the commonly asked question of how to start the introduction and implementation of portfolio management practices in an organization.

08 February 2008

Optimizing AIX with performance tuning

Just when you thought you understood performance tuning on AIX Version 5.3, here comes AIX 6.1 on its heels to throw you a curveball. In this article, get up-to-date information on the recent changes to performance monitoring and tuning in AIX 6.1, including CPU, virtual memory, and I/O (disk and network).

07 February 2008

IBM Data Studio v1.1

IBM Data Studio is a comprehensive data management solution that helps you effectively design, develop, deploy and manage your data, databases, and database applications throughout the data management life cycle utilizing a consistent and integrated user interface.

06 February 2008

Build better systems, faster with IBM’s Developer Solution eKit

With systems teams under so much pressure to develop products faster, reduce production costs, and react to changing business needs quickly, communication and collaboration seem to get lost. Now, there’s a way to improve product quality and communication. Read the “Model Driven Systems Development” white paper to see how.

05 February 2008

Websphere Extended Deployment Compute Grid v6.1

Download a free trial version of WebSphere Extended Deployment Compute Grid, which lets you schedule, execute, and monitor batch jobs. Because online transaction processing and batch jobs execute simultaneously on the same server resources, you can avoid costly duplication of resources.

BlueVoodoo's TAGS

search:

limit:50 100 200

java   linux   linx   open source   programmin   programming   unix   unix. linux