Teaser for an interesting book...
EAI - The Broader Perspective
No one should have (or will) ever dared to build a 'Single System' which will take care of the entire business requirements of an enterprise. Instead, we build few (or many) systems,and each of them takes care of a set of functionalities in a single Line of Business (LOB). There is absolutely nothing wrong here, but the need of the hour is that these systems have to exchange information and interoperate in many new ways which have not been foreseen earlier. Business grows, enterprise boundaries expands and mergers and acquisition are all norms of the day. If IT cannot scale up with these volatile environments, the failure is not far.
Problem:
Easily integrating your Linux host into a Windows environment ...
Solution:
This solution allows one to very easily navigate any number of windows/samba servers and shares with any file management application (and from the shell).
ven though Web 2.0 and rich Internet applications (RIAs) are all the rage these days, building a rich Web front end for your stakeholders is not the answer when thick-client functionality is what you really need. I stated as much in my previous article, "Building a Java App Server Foundation for Thick-Client Deployment," which showed how to leverage a traditional Java Web server architecture to easily deploy thick clients.
Exception Handling with Spring and Log4J
How to log exceptions. This technique will log messages to your server log file, send an email, with the tag stack of the error, for error level warnings and display a generic page to the user.
First step is to set up Log4j.
Make sure you have the following classes in application lib or common server lib.
activation.jar
This can be got from http://java.sun.com/products/javabeans/jaf/downloads/index.html
Set up your log4J configuration file, put this file in your WEB-INF directory
This document is a guide to help troubleshoot problems that might arise with applications that are developed using the Sun Microsystems Inc. release of Java Platform, Standard Edition 6 (JDK 6 release or Java SE 6 release). In particular, this guide addresses possible problems between the applications and the Java HotSpot virtual machine. The document provides a description of the tools, command line options, and other help in analyzing a problem. The document also provides guidance on how to approach some general issues such as a crash, hang, or memory resource issues. Finally, the document provides direction for data collection and bug report preparation.
No Thick Manuals is a wiki that offers a growing collection of quality hands-on articles and tips to the best open source applications for Linux, Windows, and Mac OS X. No Thick Manuals was born on February 6, 2005. All No Thick Manuals articles and tips are released under the GNU Free Documentation License. No Thick Manuals supports open source software (see a list of projects that have received donations).
sux0r 2.0 is an extendable content management system (CMS) built around the principles of Naive Bayesian probabilistic content.
Naive Bayesian Categorization is the ouija board of mathematics. Known for being good at filtering junk mail, the Naive Bayesian algorithm can categorize anything so long as there are coherent reference texts to work from. For example, categorizing documents in relation to a vector of political manifestos, or religious holy books, make for a neat trick. More subjective magic 8-ball categories could be "good vs. bad" or company press releases in relation to stock market prices.
In addition to being a blog, RSS aggregator, bookmark repository, and photo publishing platform, sux0r 2.0 allows users to maintain multiple lists of Naive Bayesian categories. These category lists, called vectors, can be shared with other users. This allows a group of trusted friends to share, train, and use sux0r together.
This book is an introduction to Java™ language--a widely used programming language and a platform. It is meant to be both an introductory guide and a useful reference on Java and related technologies.
ChunkIt! is a safe and innovative add-on to your Internet browser that searches and extracts the valuable "chunks" of information often hidden within the countless hyperlinks that comprise the Web.
What do we mean by a "chunk"? Think of a chunk as a compact block of content, text, or data that contains enough descriptive information pertaining to your search terms to convey an idea.
After a quick install, you'll see the new ChunkIt! search box appear in your browser. By entering keywords in the ChunkIt! search box, valuable information from the Web will become much easier to find. This revolutionary approach to search will save you hours of time and frustration because you can avoid aimless browsing and endless clicking from one link to another. It's the perfect application for researching consumer products, gathering important information, sifting through discussion groups and blogs, and finding answers to all your home and technical problems.
Using a rule engine provides a framework that allows a way to externalize business logic in a common place. This will in turn empower business users and subject matter experts of the business to easily change and manage the rules. Coding such rules directly into the application makes application maintenance difficult and expensive because the rules change so often. This article goes into detail on how to architect and build a service that uses Drools to provide business decisions. This service can be part of the overall enterprise SOA infrastructure. As such, it can either be a standalone service that is consumed in a one-to-many model by all contracted consumers, or part of a composite service that provides a complex business functionality. To illustrate this point, the article shows how a service using the Drools rule engine can hide the complexity of automating mortgage underwriting decisions that a mortgage company needs to make on a daily basis.
S. Angelov, P. Grefen, and D. Greefhorst. Joint Working IEEE/IFIP Conference on Software Architecture, 2009 & European Conference on Software Architecture. WICSA/ECSA 2009, page 141--150. IEEE, (September 2009)
L. Cameron, S. Wise, and S. Lottridge. College & Research Libraries, 68 (3):
229-236(May 2007)M3: Article; Cameron, Lynn 1 Email Address: camerosl@jmu.edu Wise, Steven L. 2 Email Address: wisesl@jmu.edu Lottridge, Susan M. 3 Email Address: daffinsm@jmu.edu; Affiliations: 1: Coordinator of Library Instruction, James Madison University Libraries, James Madison University 2: Professor of Graduate Psychology and Coordinator, Institute for Computer-Based Assessment, Center for Assessment and Research Studies, James Madison University 3: Doctoral Student, Center for Assessment and Research Studies, James Madison University; Source Information: May2007, Vol. 68 Issue 3, p229; Subject Term: INFORMATION literacy; Subject Term: ABILITY -- Testing; Subject Term: COMPUTERS & literacy; Subject Term: LITERACY; Subject Term: EDUCATION -- Standards; Subject Term: EDUCATIONAL evaluation; Subject Term: Software; Number of Pages: 8p; Illustrations: 2 charts; Document Type: Article.
S. Canazza, and A. Dattolo. Proceedings of the IASTED European Conference on Internet and Multimedia Systems and Applications - EuroIMSA 2007, Chamonix, France, (May 2007)http://users.dimi.uniud.it/~antonina.dattolo/papers/euroimsa2007.pdf.
C. Cattuto, D. Benz, A. Hotho, and G. Stumme. The Semantic Web -- ISWC 2008: 7th International Semantic Web Conference, Karlsruhe, Germany, volume 5318 of Lecture Notes in Computer Science, Springer, Berlin, (2008)