| |
Current Topic: Technology |
|
ONJava.com -- Clustering with JBoss 3.0 |
|
|
Topic: Technology |
7:33 am EST, Feb 18, 2006 |
Whenever an organization thinks about building and deploying a J2EE application, they think scalability and reliability. How can my Web site stay up 24/7? Will my infrastructure be able to handle the traffic? How can I ensure that I don't lose any transactions or data? How do I manage large server farms? To answer these questions, many Java architects look to their application server's clustering features. This article looks at the kinds of features needed to develop robust J2EE applications and how JBoss 3.0, an open source J2EE application server, can be the solution of choice.
ONJava.com -- Clustering with JBoss 3.0 |
|
Topic: Technology |
7:24 am EST, Feb 18, 2006 |
High Availability Enterprise Services via JBoss Clusters16.1.�IntroductionClustering allows us to run an applications on several parallel servers (a.k.a cluster nodes). The load is distributed across different servers, and even if any of the servers fails, the application is still accessible via other cluster nodes. Clustering is crucial for scalable enterprise applications, as you can improve performance by simply adding more nodes to the cluster.The JBoss Application Server (AS) comes with clustering support out of the box. The simplest way to start a JBoss server cluster is to start several JBoss instances on the same local network, using the run -c all command for each instance. Those server instances, all started in the all configuration, detect each other and automatically form a cluster.In the first section of this chapter, I discuss basic concepts behind JBoss's clustering services. It is important that you understand those concepts before reading the rest of the chapter. Clustering configurations for specific types of applications are covered after this section.
JBoss Clustering |
|
Configuring GnuPG (Mac OS X) - zeitform Internet Dienste |
|
|
Topic: Technology |
5:13 am EST, Feb 18, 2006 |
On this page we want to instruct you on how to install and setup GnuPG (for Mac OS X) to encrypt your mail and textfiles. Detailed Instructions on GnuPG can be found on the projects website. Furthermore we will introduce you to some useful tools that ease your work with GnuPG. If you are looking for a public key to import into your keychain, you can Ask a Key Server.
Configuring GnuPG (Mac OS X) - zeitform Internet Dienste |
|
Yahoo! Design Pattern Library |
|
|
Topic: Technology |
6:36 pm EST, Feb 16, 2006 |
Welcome to the Yahoo! Design Pattern Library. We are very happy to be sharing our library with the design and development community. This is our first drop of what we hope to be a monthly release cycle for the publication of patterns. In many cases we have bundled the patterns with pointers to related code from the Yahoo! User Interface Code Library. We hope this is a useful resource and look forward to your feedback.
Yahoo! Design Pattern Library |
|
Topic: Technology |
6:35 pm EST, Feb 16, 2006 |
ActiveWidgets controls come as a library of custom JavaScript classes. You create a new control instance inside the script block the same way as any other JavaScript object - using operator ‘new�€™ together with the constructor function
ActiveWidgets |
|
Topic: Technology |
6:34 pm EST, Feb 16, 2006 |
Survey of AJAX/JavaScript Libraries Please note these libraries appear in alphabetical order. If you're adding one to this list, please add it in alphabetical order rather than sticking it at the top.
AjaxLibraries |
|
Mastering Ajax, Part 3: Advanced requests and responses in Ajax |
|
|
Topic: Technology |
5:45 pm EST, Feb 16, 2006 |
For many Web developers, making simple requests and receiving simple responses is all they'll ever need, but for developers who want to master Ajax, a complete understanding of HTTP status codes, ready states, and the XMLHttpRequest object is required. In this article, Brett McLaughlin will show you the different status codes and demonstrate how browsers handle each and he will showcase the lesser-used HTTP requests that you can make with Ajax.
Mastering Ajax, Part 3: Advanced requests and responses in Ajax |
|
Blocking brute force attacks against ssh with iptables and netfilter |
|
|
Topic: Technology |
4:34 pm EST, Feb 16, 2006 |
The goal of this article is to outline a simple method for blocking brute force attacks on sshd for users of Slackware Linux. With a few minor changes, this technique will work on any Linux box with netfilter support in the kernel and a reasonably recent version of iptables (1.3.x) installed. It makes use of the ipt_recent module for netfilter to track who just connected to the port, and to refuse subsequent connections from that host for a given number of seconds. One side effect of this technique is that it will slow down the idiots scanning the Internet looking for even bigger idiots.
Good link dag Blocking brute force attacks against ssh with iptables and netfilter |
|
How the lack of constraints killed the quality of Star Wars - Signal vs. Noise (by 37signals) |
|
|
Topic: Technology |
4:31 pm EST, Feb 16, 2006 |
Constraints are a unique advantage that small teams have over the big guys. Less money, less time, less people. Don’t be too eager to relieve yourself of these advantages through VC money, long release cycles, and quick hires.
Short, and to the point: keep more of your equity, get less money, and keep your soul. How the lack of constraints killed the quality of Star Wars - Signal vs. Noise (by 37signals) |
|