Sunday, September 5, 2010

Cookies in silverlight

Hi all,

here i demonstrate how to set the cookies and get the values of the cookies and set the values of the cookies in the silverlight. for that i am making 2 function named GetCookie() and SetCookie().

in my project i have 2 textbox for the key and the value of the cookies then 1 button that set the value of the cookies by the key and then one button that show the cookies value by the key.

Note : For using the cookie, you have to add namespance “System.Windows.Browser”.

Step 1 : Create new silverlight project.

Step 2 : in mainpage.xaml file





Step 3 : my mainpage.xaml.cs file

using System;
using System.Collections.Generic;
using System.Linq;
using System.Net;
using System.Windows;
using System.Windows.Controls;
using System.Windows.Documents;
using System.Windows.Input;
using System.Windows.Media;
using System.Windows.Media.Animation;
using System.Windows.Shapes;
using System.Windows.Browser;
namespace SilverlightCookies

{
public partial class MainPage : UserControl
{
public MainPage()
{
InitializeComponent();
}

private void SetCookie(string key, string value)

{

DateTime expireDate = DateTime.Now + TimeSpan.FromHours(1);

string newCookie = key + "=" + value + ";expires=" + expireDate.ToString("R");
HtmlPage.Document.SetProperty("cookie", newCookie);
}

private string GetCookie(string key)

{
string[] cookies = HtmlPage.Document.Cookies.Split(';');
foreach (string cookie in cookies)
{
string[] keyValue = cookie.Split('=');
if (keyValue.Length == 2)
{
if (keyValue[0].ToString().Trim() == key.Trim())
return keyValue[1];
}
}
return null;
}

private void Button_Click(object sender, RoutedEventArgs e)

{
SetCookie(txtCookieskey.Text.Trim(), txtCookiesValue.Text.Trim());
LblCookies.Text = "Cookes has been Created";
}

private void Button_Click_1(object sender, RoutedEventArgs e)

{
LblDisplayCookies.Text = GetCookie(txtCookieskey.Text.Trim());
LblCookies.Text = "Display Cookies of " + txtCookieskey.Text;
}
}
}



Step 4 : Run the application…

for this you get 2 textbox and 2 button.

when i input the key and value in the textbox and press button of “Set Cookies”, it set the key of cookies by that value and when i click on “get Cookies” by typing key value in key textbox, it show me the value of the key in cookie.

Wednesday, September 1, 2010

E-learning

E-learning comprises all forms of electronically supported learning and teaching, which are procedural in character and aim to effect the construction of knowledge with reference to individual experience, practice and knowledge of the learner. Information and communication systems, whether networked or not, serve as specific media to implement the learning process[1].

E-learning is essentially the computer and network enabled transfer of skills and knowledge. E-learning applications and processes include Web-based learning, computer-based learning, virtual classrooms and digital collaboration. Content is delivered via the Internet, intranet/extranet, audio or video tape, satellite TV, and CD-ROM. It can be self paced or instructor led and includes media in the form of text, image, animation, streaming video and audio.


Benefits


eLearning can provide benefits for the organizations and individuals involved.

1. Increased access: Instructors of the highest calibre can share their knowledge across borders, allowing students to attend courses across physical, political, and economic boundaries. Recognized experts have the opportunity of making information available internationally, to anyone interested at minimum costs. For example, the MIT OpenCourseWare program has made substantial portions of that university's curriculum and lectures available for free online.
2. Convenience and flexibility to learners: in many contexts, eLearning is self-paced and the learning sessions are available 24x7. Learners are not bound to a specific day/time to physically attend classes. They can also pause learning sessions at their convenience. High technology is not necessary for all online courses. Basic internet access, audio, and video capabilities are common requirements.[2] Depending on the technology used, students can begin their courses while at work and finish those at an alternate internet equipped location.
3. Skill Development: To develop the skills and competencies needed in the 21st century, in particular to ensure that learners have the digital literacy skills required in their discipline, profession or career. Bates (2009)[3] states that a major argument for eLearning is that it enables learners to develop essential skills for knowledge-based workers by embedding the use of information and communications technologies within the curriculum. He also argues that using eLearning in this way has major implications for course design and the assessment of learners.


Computer-based learning

Computer-based learning, sometimes abbreviated to CBL, refers to the use of computers as a key component of the educational environment. While this can refer to the use of computers in a classroom, the term more broadly refers to a structured environment in which computers are used for teaching purposes.
[edit] Computer-based training

Computer-Based Trainings (CBTs) are self-paced learning activities accessible via a computer or handheld device. CBTs typically present content in a linear fashion, much like reading an online book or manual. For this reason they are often used to teach static processes, such as using software or completing mathematical equations. The term Computer-Based Training is often used interchangeably with Web-based training (WBT) with the primary difference being the delivery method. Where CBTs are typically delivered via CD-ROM, WBTs are delivered via the Internet using a web browser. Assessing learning in a CBT usually comes in the form of multiple choice questions, or other assessments that can be easily scored by a computer such as drag-and-drop, radial button, simulation or other interactive means. Assessments are easily scored and recorded via online software, providing immediate end-user feedback and completion status. Users are often able to print completion records in the form of certificates.

CBTs provide learning stimulus beyond traditional learning methodology from textbook, manual, or classroom-based instruction. For example, CBTs offer user-friendly solutions for satisfying continuing education requirements. Instead of limiting students to attending courses or reading printing manuals, students are able to acquire knowledge and skills through methods that are much more conducive to individual learning preferences.[citation needed] For example, CBTs offer visual learning benefits through animation or video, not typically offered by any other means.[citation needed]

CBTs can be a good alternative to printed learning materials since rich media, including videos or animations, can easily be embedded to enhance the learning. Another advantage to CBTs are that they can be easily distributed to a wide audience at a relatively low cost once the initial development is completed.[citation needed]

However, CBTs pose some learning challenges as well. Typically the creation of effective CBTs requires enormous resources. The software for developing CBTs (such as Flash or Adobe Director) is often more complex than a subject matter expert or teacher is able to use. In addition, the lack of human interaction can limit both the type of content that can be presented as well as the type of assessment that can be performed. Many learning organizations are beginning to use smaller CBT/WBT activities as part of a broader online learning program which may include online discussion or other interactive elements.

Visual Studio 2010



On April 12, 2010, Microsoft released Visual Studio 2010, codenamed Dev10, and .Net Framework4 Visual Studio 2010 IDE has been redesigned which, according to Microsoft, clears the UI organization and "reduces clutter and complexity. Visual Studio 2010 comes with .NET Framework 4 and supports developing applications targeting Windows 7. It supports IBM DB2 and Oracle databases , in addition to Microsoft SQL Server. It has integrated support for developing Microsoft Silverlight applications, including an interactive designer. Visual Studio 2010 offers several tools to make parallel programming simpler: in addition to the Parallel Extensions for the .NET Framework and the Parallel Patterns Library for native code, Visual Studio 2010 includes tools for debugging parallel applications. The new tools allow the visualization of parallel Tasks and their runtime stacks. The Visual Studio 2010 code editor now highlights references; whenever a symbol is selected, all other usages of the symbol are highlighted. It also offers a Quick Search feature to incrementally search across all symbols in C++, C# and VB.NET projects.

Visual Studio 2010 has New and enhanced features that help to unleash our creativity and Customise our workspace with multiple monitor support. Create rich applications for SharePoint and the Web. Eliminate the dreaded "no repro" problem with IntelliTrace. Develop for a wide range of .NET Framework versions with precise multi-targeting.

Visual Studio Ultimate 2010

Visual Studio Ultimate 2010 includes a Historical Debugger for managed code called IntelliTrace. Unlike the current debugger, that records only the currently-active stack, IntelliTrace records all events like prior function calls, method parameters, events, exceptions etc. This allows the code execution to be rewound in case a breakpoint wasn't set where the error occurred. IntelliTrace will cause the application to run slower than the current debugger, and will use more memory as additional data needs to be recorded. Microsoft allows configuration of how much data should be recorded, in effect allowing developers to balance speed of execution and resource usage. The Lab Management component of Visual Studio Ultimate 2010 uses virtualization to create a similar execution environment for testers and developers. The virtual machines are tagged with checkpoints which can later be investigated for issues, as well as to reproduce the issue. Visual Studio Ultimate 2010 also includes the capability to record test runs that capture the specific state of the operating environment as well as the precise steps used to run the test. These steps can then be played back to reproduce issues.

VISUAL STUDIO 2010 EDITIONS

Professional, Premium, Ultimate and Test Professional. Each edition of Microsoft® Visual Studio® 2010 was built with the specific needs of individual developers and development teams in mind
1. Visual Studio 2010 Professional

Microsoft Visual Studio 2010 Professional is the essential tool for individuals performing basic development tasks. It simplifies the creation, debugging and deployment of applications on a variety of
platforms including SharePoint and the Cloud. Visual Studio 2010 Professional comes with integrated support for test-driven development, as well as debugging tools that help ensure high-quality solutions.
2. Visual Studio 2010 Premium

Microsoft Visual Studio 2010 Premium is a complete toolset that simplifies application development for individuals or teams, allowing the delivery of deliver scalable, high-quality applications. Whether writing application or database code, building databases, testing or debugging you can increase your productivity using powerful tools that work the way you work.
3. Visual Studio 2010 Ultimate

Microsoft Visual Studio 2010 Ultimate is the comprehensive suite of application lifecycle management tools for teams to ensure quality results, from design to deployment. Whether you're creating new solutions or enhancing existing applications, Visual Studio 2010 Ultimate lets you bring your vision to life targeting an increasing number of platforms and technologies — including cloud and parallel computing.
4. Visual Studio 2010 Test Professional

Microsoft Visual Studio 2010 Test Professional is a specialised toolset for quality assurance teams that simplifies test planning and manual test execution. Test Professional works in conjunction with Visual Studio software for developers, enabling effective collaboration between developers and testers throughout the application development lifecycle.

ASP.NET Web Application Security

Securing an ASP.NET application requires a clear understanding of all the security options provided in ASP.NET, and how all the various security subsystems interact.


How ASP.NET Security Works


The ASP.NET security framework accomplishes this by working in conjunction with the various security subsystems present in the machine where ASP.NET is installed. This includes security provided by the operating system ( NTFS file access permissions ) as well as security provided by IIS ( host or IP address authorization ).

And since ASP.NET is built on the Microsoft .NET Framework, the ASP.NET application developer also has access to all of the built-in security features of the .NET Framework, such as code access security and role-based user-access security.

It is imperative to understand how the various security subsystems interact, to be able to secure your ASP.NET application effectively.

ASP.NET Security Architecture.

IIS always assumes that a set of credentials maps to a Windows NT account and uses them to authenticate a user. There are three different kinds of authentication available in IIS 5.0: basic, digest, and Integrated Windows Authentication ( NTLM or Kerberos ). You can select the type of authentication to use in the IIS administrative services

Setting up a LAN using Linux


Linux is increasingly popular in the computer networking/telecommunications industry.
Acquiring the Linux operating system is a relatively simple and inexpensive task
since virtually all of the source code can be downloaded from several different
FTP or HTTP sites on the Internet. In addition, the most recent version of Red Hat
Linux can be purchased from computer retail stores for between $25 and $50, depending
on whether you purchase the standard or full version. The retail brand is indeed
a worthwhile investment (vs. the free FTP or HTTP versions) since valuable technical
support is included directly from the Red Hat Linux engineers for at least a year.
This can be very helpful if, for instance, you can not resolve an installation/configuration
problem after consulting the Red Hat Linux manuals.



This article describes how to put together a Local Area Network (LAN) consisting
of two or more computers using the Red Hat Linux 6.2 operating system. A LAN
is a communications network that interconnects a variety of devices and provides
a means for exchanging information among those devices. The size and scope of a
LAN is usually small, covering a single building or group of buildings. In a LAN,
modems and phone lines are not required, and the computers should be close enough
to run a network cable between them.



For each computer that will participate in the LAN, you'll need a network interface
card (NIC) to which the network cable will be attached. You will also need to assign
a unique hostname and IP address to each computer in the LAN (described later in
this article), but this requires a basic understanding of TCP/IP (Transmission Control
Protocol/Internet Protocol).



Introduction to TCP/IP



TCP/IP is the suite of protocols used by the Internet and most LANs throughout the
world. In TCP/IP, every host (computer or other communications device) that is connected
to the network has a unique IP address. An IP address is composed of four octets
(numbers in the range of 0 to 255) separated by decimal points. The IP address is
used to uniquely identify a host or computer on the LAN. For example, a computer
with the hostname Morpheus could have an IP address of 192.168.7.127. You should
avoid giving two or more computers the same IP address by using the range of IP
addresses that are reserved for private, local area networks; this range of IP addresses
usually begins with the octets 192.168.



LAN network address The first three octets of an IP address should be the
same for all computers in the LAN. For example, if a total of 128 hosts exist in
a single LAN, the IP addresses could be assigned starting with 192.168.1.x,
where x represents a number in the range of 1 to 128. You could create consecutive
LANs within the same company in a similar manner consisting of up to another 128
computers. Of course, you are not limited to 128 computers, as there are other ranges
of IP addresses that allow you to build even larger networks.



There are different classes of networks that determine the size and total possible
unique IP addresses of any given LAN. For example, a class A LAN can have over 16
million unique IP addresses. A class B LAN can have over 65,000 unique IP addresses.
The size of your LAN depends on which reserved address range you use and the subnet
mask (explained later in the article) associated with that range (see Table 1.).




Table 1. Address ranges and LAN sizes





























Address range

Subnet mask

Provides

Addresses per LAN

10.0.0.0 - 10.255.255.255.255

255.0.0.0

1 class A LAN

16,777,216

172.16.0.0 - 172.31.255.255

255.255.0.0

16 class B LANs

65,536

192.168.0.0 - 192.168.255.255

25.255.255.0

256 class C LANs

256


Network and broadcast addresses

Another important aspect of building a LAN is that the addresses at the two extreme
ends of the address range are reserved for use as the LAN's network address and
broadcast address. The network address is used by an application to represent
the overall network. The broadcast address is used by an application to send
the same message to all other hosts in the network simultaneously.



For example, if you use addresses in the range of 192.168.1.0 to 192.168.1.128,
the first address (192.168.1.0) is reserved as the network address, and the last
address (192.168.1.128) is reserved as the broadcast address. Therefore, you only
assign individual computers on the LAN IP addresses in the range of 192.168.1.1
to 192.168.1.127:


















Network address:

192.168.1.0

Individual hosts:

192.168.1.1 to 192.168.1.127

Broadcast address:

192.168.1.128


Subnet masks

Each host in a LAN has a subnet mask. The subnet mask is an octet that uses
the number 255 to represent the network address portion of the IP address and a
zero to identify the host portion of the address. For example, the subnet mask 255.255.255.0
is used by each host to determine which LAN or class it belongs to. The zero at
the end of the subnet mask represents a unique host within that network.



Domain name

The domain name, or network name, is a unique name followed by a standard
Internet suffixes such as .com, .org, .mil, .net, etc. You can pretty much name
your LAN anything if it has a simple dial-up connection and your LAN is not a server
providing some type of service to other hosts directly. In addition, our sample
network is considered private since it uses IP addresses in the range of 192.168.1.x.
Most importantly, the domain name of choice should not be accessible from the Internet
if the above constraints are strictly enforced. Lastly, to obtain an "official"
domain name you could register through InterNIC, Network Solutions or Register.com.
See the Resources section later in this article for the
Web sites with detailed instructions for obtaining official domain names.



Hostnames

Another important step in setting up a LAN is assigning a unique hostname to each
computer in the LAN. A hostname is simply a unique name that can be made up and
is used to identify a unique computer in the LAN. Also, the name should not contain
any blank spaces or punctuation. For example, the following are valid hostnames
that could be assigned to each computer in a LAN consisting of 5 hosts: hostname
1 - Morpheus; hostname 2 - Trinity; hostname 3 - Tank; hostname 4 - Oracle; and
hostname 5 - Dozer. Each of these hostnames conforms to the requirement that no
blank spaces or punctuation marks are present. Use short hostnames to eliminate
excessive typing, and choose a name that is easy to remember.



Table 2 summarizes what we have covered so far in this article. Every host in the
LAN will have the same network address, broadcast address, subnet mask, and domain
name because those addresses identify the network in its entirety. Each computer
in the LAN will have a hostname and IP address that uniquely identifies that particular
host. The network address is 192.168.1.0, and the broadcast address is 192.168.1.128.
Therefore, each host in the LAN must have an IP address between 192.168.1.1 to 192.168.127.




Table 2. Sample IP addresses for a LAN with 127 or fewer interconnected
computers









































IP address

Example

Same/unique

Network address

192.168.1.0

Same for all hosts

Domain name

www.yourcompanyname.com

Same for all hosts

Broadcast address

192.168.1.128

Same for all hosts

Subnet mask

255.255.255.0

Same for all hosts

Hostname

Any valid name

Unique to each host

Host addresses

192.168.1.x

x must be unique to each host



Assigning IP addresses in a LAN



There are two ways to assign IP addresses in a LAN. You can manually assign a static
IP address to each computer in the LAN, or you can use a special type of server
that automatically assigns a dynamic IP address to each computer as it logs
into the network.



Static IP addressing

Static IP addressing means manually assigning a unique IP address to each computer
in the LAN. The first three octets must be the same for each host, and the last
digit must be a unique number for each host. In addition, a unique hostname will
need to be assigned to each computer. Each host in the LAN will have the same network
address (192.168.1.0), broadcast address (192.168.1.128), subnet mask (255.255.255.0),
and domain name (yourcompanyname.com). It's a good idea to start by visiting each
computer in the LAN and jotting down the hostname and IP address for future reference.



Dynamic IP addressing

Dynamic IP addressing is accomplished via a server or host called DHCP (Dynamic
Host Configuration Program) that automatically assigns a unique IP address to each
computer as it connects to the LAN. A similar service called BootP can also automatically
assign unique IP addresses to each host in the network. The DHCP/ BootP service
is a program or device that will act as a host with a unique IP address. An example
of a DHCP device is a router that acts as an Ethernet hub (a communications device
that allows multiple host to be connected via an Ethernet jack and a specific port)
on one end and allows a connection to the Internet on the opposite end. Furthermore,
the DHCP server will also assign the network and broadcast addresses. You will not
be required to manually assign hostnames and domain names in a dynamic IP addressing
scheme.





The LAN hardware



Assigning hostname and IP addresses will be useless if there is no hardware available
to connect all the computers together. There are several different types of hardware
schemes such as Ethernet, Token Ring, FDDI, Token Bus, etc. Since Ethernet is the
most widely used hardware scheme, we will focus our attention on it. Ethernet is
available from several different computer vendors, and it is relatively inexpensive.
Ethernet is a 10-Mbps baseband LAN specification developed by Xerox, Intel, and
Digital Equipment. In order to build an Ethernet hub you need the following: an
Ethernet Network Interface Card (NIC) for each computer, an Ethernet compatible
hub with at least the same number of ports as there will be computers in the LAN,
and Ethernet cables (or 10BaseT cables) to connect each computer's NIC to the Ethernet
hub.



Also make sure that the hardware of choice is compatible with the Red Hat Linux
operating system. This hardware/software compatibility information is usually found
in the Requirements section on the back of the box of each product. Alternatively,
you could ask a computer sales person about hardware/software requirements. You
can usually save money by purchasing LAN cards as a package vs. purchasing them
individually.



When choosing an Ethernet hub ensure that it contains at least as many ports as
there are computers that will participate in the LAN. It is always best to choose
a hub with additional ports to allow for expansion.



If you plan to use all of the computers in the LAN to access the Internet via a
local Internet Service Provider (ISP), the router/Ethernet combo is an ideal choice.
The router/Ethernet unit is normally configured using any computer that is connected
to the LAN. Assuming that all computers in the LAN will be running the Red Hat Linux
operating system, a router will be required that can be configured using a Linux
configuration program such as LinuxConf.



Finally, choose network cables to allow for expansion. Typically, most Ethernet
networks use 10BaseT cables with RJ45 jacks at each end. It's always a good idea
to purchase cables that are 1 or 2 times longer than the required length in case
the structure (topology) of the LAN changes in the future.



Installing the hardware

Assuming that all LAN hardware is available, the next step is to install it. First
turn off all the computers that will participate in the LAN. Next, open the case
on each computer and install each NIC in the appropriate slot on the motherboard,
being careful to follow the manufacturer's instructions.



Find a convenient but safe location for the Ethernet hub, preferably a centralized
location in the same building or room along with the computers. Next, run the cable
from the NIC in each computer to the Ethernet hub ensuring all cables are out of
the way of users who will need physical access to each computer in the LAN. Moreover,
make sure you follow all instructions provided with the LAN hardware before starting
up any of the computers that will participate in the LAN.



If you are using a router to connect the LAN to the Internet or using a DHCP server,
you will need to do some configuration as required by the user's manual. Lastly,
assuming all computers are attached to the Ethernet hub via the NIC and a specific
port on the hub, you can now begin the software configuration process using the
Red Hat operating system.



Configuring the LAN



How you configure the computers on the LAN will depend on whether the Red Hat OS
was installed before or after the LAN hardware. If you installed the LAN hardware
before installing Red Hat you will be prompted for network configuration during
the Red Hat installation process. However, if you installed the Red Hat OS after
the LAN hardware, a program called "Kudzu" will detect the newly installed Ethernet
card and initiate the configuration process automatically. Follow these steps when
configuring each Ethernet card using the "Kudzu" program:



  1. During the bootup process look for a dialog box titled "Welcome to Kudzu." Press
    Enter to begin the configuration process.
  2. Next, you should see another dialog
    box that displays the brand name for the installed Ethernet card. Press Enter again
    to continue.
  3. After a brief delay you should see "Would You Like to Set up Networking".

  4. Select the NO option using the Tab key and then press Enter. I will describe setting
    up networking using a utility called LinuxConf later in this article.



At this point, the bootup process should continue normally and you will be required
to log on to the computer as the root user. You should have been given the opportunity
to create a root account during the initial installation of Red Hat.



Using LinuxConf to configure your Ethernet card

You can use an application program called LinuxConf to configure or reconfigure
the NIC of each computer in the LAN. You can launch the LinuxConf utility by typing
linuxconf at the command prompt of any terminal window in the KDE or
GNOME desktop environment. Another way to start the LinuxConf utility is to click
the Main menu button, select System, then LinuxConf. When the LinuxConf application
is displayed, follow the steps below to configure the Ethernet card:



  1. From the LinuxConf tree structure, select Config, Networking, Client Tasks, Basic
    Host Information.

  2. Type the fully qualified hostname that you assigned to this computer on the Host
    name tab.
  3. Next, click the Adaptor 1 tab, which displays your Ethernet card settings.

  4. Verify that the Enabled button is selected to ensure that the Ethernet card will
    be accessible.
  5. Choose the Manual option if you will not be using a DHCP or BootP
    server on your LAN and continue to step 6. Otherwise, if you
    will be using a DHCP or BootP server, choose either DHCP or BootP accordingly and
    continue to step 12.
  6. Enter this computer's
    hostname followed by a period and the domain name of the LAN for the Primary name
    + domain option.
  7. Enter the computer's hostname in addition to any aliases separated
    by a blank space under the Aliases option.
  8. Enter the IP address assigned to
    this computer next to IP Address (such as 192.168.1.1).
  9. Type in 255.255.255.0
    for the Netmask.

  10. For net device, type eth0, which represents the first Ethernet card located inside
    the computer.
  11. The driver or Kernel Module option for the Ethernet card should
    automatically be filled in upon exiting LinuxConf.
  12. Click
    the Accept button to activate all changes.
  13. Repeat steps 1-12 for each computer
    in the LAN, verifying that you've entered the correct hostname and the corresponding
    IP address.


Nameserver specification

Another important step in setting up LAN is to configure the Nameserver specification,
which is used by Linux to look up IP addresses when only the computer's hostname
is given. There are two methods that are used by Red Hat Linux to resolve hostnames
into IP addresses. One method is via Domain Name Services (DNS), and the other is
by means of a local file at /etc/hosts. Locate the hosts file by typing cd /etc
to change to the /etc directory. The /etc directory is where most system configuration
files are found for each computer. Next, follow the steps below to resolve hostnames
into IP address using the /etc/hosts file:



  1. In the left column of LinuxConf, open the Nameserver specification (DNS) category.

  2. Left-click the DNS Usage option. (The button should be pushed in.)
  3. Enter localdomain
    next to the Search Domain 1 category.
  4. If you know the primary and secondary
    IP addresses for the nameserver, which should be available for this Ethernet card,
    enter those in the IP of nameserver 1 and IP of nameserver 2 categories. Otherwise,
    you can leave those categories blank.
  5. Left-click the Accept button to activate
    all changes.



Hostname search path

The hostname search path is used by Red Hat Linux to search for IP addresses assigned
to hostnames. To configure the hostname search path so that the local host (/etc/hosts)
file is used to resolve local hostnames, and the ISP domain services to resolve
Internet domain services, follow these steps:



  1. In the left column of LinuxConf, open the Routing and Gateways category.

  2. Select the Host Name Search path option.
  3. In the right column of LinuxConf, select
    the Multiple IPs for One Host option.
  4. Select the hosts, dns option in the right
    portion of LinuxConf.
  5. Left-click the Accept button to activate all changes.



Setting up /etc/hosts

The Red Hat Linux OS needs some way to find IP addresses within the LAN based on
the each computer's hostname. I described earlier in the article that the Domain
Name Service (DNS) is one method of resolving hostnames into IP addresses. In a
DNS configuration the hostnames and IP addresses should already be listed in a pre-existing
nameserver. Consult your local ISP to obtain those IP addresses. On the other hand,
if there is a centralized nameserver, as with small LANs, a host file will need
to be configured on each computer that was assigned a hostname, IP address, and
any aliases. This configuration process involves editing a text file located at
/etc/host. You will need to go to one of the computers in the LAN and follow the
below steps in order to create and configure the /etc/hosts file:



  1. In the left column of LinuxConf, open the Misc category.
  2. Open the Information
    about hosts category. You should see an entry for this computer that includes the
    IP address, hostname, and any aliases.
  3. Left-click the Add button once to add
    an entry for another host in the LAN.
  4. Type the Primary + Domain Name for another
    host in the LAN in the dialog box that appears (such as trinity.yourcompanyname.com).

  5. Type one or more aliases for this computer next to the Alias option (such as tank).

  6. Enter the IP address for the hostname that you've assigned for this computer next
    to IP number.
  7. Left-click the Accept button to activate all changes.

  8. Repeat steps 1-7 for each computer in your LAN.



After you have done steps 1-7 for all computers, the /etc/hosts tab of LinuxConf
should list one entry for every computer in your LAN, in addition to the local host's
loopback interface. The local host name should appear as localhost. Finally, you
can save all changes and exit the LinuxConf application by following the steps below:



  1. Left-click the Quit button in the /etc/host screen after all hostnames and IP addresses
    have been entered.
  2. To exit the LinuxConf application, left-click the Quit button
    at the bottom-left corner.
  3. Left-click the Activate the Changes button to activate
    all changes and exit LinuxConf.



Repeat for every host

Now that you have configured one computer in you LAN, you will need to go back and
repeat all the above steps for each computer starting with the section
"Configuring the LAN"
. If you would prefer a less time-consuming procedure
of configuring each computer, you can modify the /etc/hosts file on each computer
manually using a copy method.



You can copy the /etc/hosts file that you have just created to a floppy disk or
CD-ROM (if you have a writeable CD-ROM drive) and copy that file to the /etc directory
of each computer in your LAN. To copy the /etc/hosts file to a floppy disk, type
the command cp /etc/hosts /mnt/floppy at the command prompt. Do this
on the computer where you configured the initial /etc/hosts file using the LinuxConf
utility.



Next, take the floppy to each computer in the LAN and type the command cp /mnt/floppy
hosts /etc/host
in a terminal window. This will copy the hosts file to
the /etc directory on each host. If you are using a CD-ROM, replace the /mnt/floppy/
in the above commands with //mnt/cdrom/ to copy files to and from a
writeable CD-ROM. The /etc/hosts file, as you probably noticed, is just a text file
with a list of hostnames and IP addresses separated into three columns. Lastly,
make sure that the local computer and its associated IP address are listed twice
and all the other computers in the LAN are listed only once.

Testing the LAN



To test the completely configured LAN, make sure that the computers are able to
communicate with each other after the bootup process. You can start by typing
reboot
at the command prompt at a command terminal on each computer.
This allows you to monitor the testing information that scrolls down the screen
as a standard procedure during the Linux boot process. Look for the following information:


















Setting hostname:


<hostname you assigned to this computer>


Bringing up Interface lo:


<OK> or <FAILED>


Bringing up interface eth0


<OK> or <FAILED>



The Setting hostname field should display the hostname that you assigned for this
computer. The lo and eth0 interfaces should display [OK] to indicate that both tests
were successful.



To determine whether each computer can communicate with every other computer in
the LAN, use the ping command. Open any terminal window on the current host and
type the command ping <IP address> or <hostname>, where
<IP address> or <hostname> is the IP address and/or the hostname that
you assigned to this computer. Note that you must type either the IP address or
the hostname in order for the ping command to work properly.



If you have configured the DNS nameserver specification properly, the ping <hostname>
command should resolve the hostname into a corresponding IP address. Otherwise,
you will need to use the IP address that you should currently already have listed
for all computers in the LAN. The ping command will send messages across the LAN
to the designated IP address or computer. You should see several messages or packets
(consisting of bytes of information) if the computers are "talking" or communicating
with each other. These packets look similar to the following:









64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms
64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms
64 bytes from 192.168.1.x : icmp_seq=0 ttl=255 time=0.8ms






Note that the "192.168.1" represents the LAN that this particular host is a member
of and the x indicates the specific host number that you are attempting to ping
(e.g. such as Oracle) which jointly makes up the IP address. You can press the Ctrl+C
to terminate the test and you should see the following basic information about the
entire ping test:









--- hostname.yourcompanyname.com ping statistics  ---
4 packets transmitted, 4 packets received, 0% packet loss
round-trip min/avg/max = 0.3/0.4/0.8 ms





Verify that the packet loss is 0%, which is an immediate indication that the test
was successful. However, there is a problem if the ping command results in the following
message:









From hostname.comanyname.com (192.168.1.1): Destination Host Unreachable





This is an immediate indication that the two computers are not communicating at
all. If the computers are not communicating, see the next section, "Troubleshooting
the LAN"
. Otherwise, when you can successfully ping all other computers
in the LAN from one designated computer, the overall basic communications functionality
is indeed a success. At this point, you can consider this LAN to be a fully functional
network that you can install and on which you can configure various network services
as desired.



Troubleshooting the LAN



If you are unable to ping another computer in the LAN, here's how to get to the
source of the problem. First of all, it's a good idea to shut down every computer
in the LAN using the halt command. At the command prompt on each computer, type
halt. The main reason for shutting down all computers is to monitor
feedback from the boot process when each computer is started up again.



Check all cable connections between every computer, making sure that all RJ45 jacks
are connected properly. After verifying that all the cables are secured properly,
start each computer one at a time and look for the following response during the
boot process:









Setting hostname: hostname.networkname  [OK]





You can turn on the interactive mode by typing I at the LILO boot prompt during
the initial bootup process of Red Hat to get a closer view of the feedback. Ensure
that the hostname and network name that was assigned to this computer is spelled
correctly. If this is not the case, you will need to return to the Basic Host Information
section of LinuxConf. In interactive mode you will be prompted to start several
services. Respond to each question with Yes and pay close attention to results of
various tests. If the Kudzu program detects an Ethernet card, then this an indication
that the card was not properly configured the first time around. Proceed to let
Kudzu configure the card. When you are prompted to configure the network, choose
"Yes" and type the correct IP address and other related information for this particular
computer.



Another important response to examine carefully is the following:









Bringing up interface eth0  [OK]





This line indicates whether the Ethernet card is working properly. If this test
fails you should check all network settings using LinuxConf to ensure that the card
was configured properly. If the network settings are correct, there is probably
a defect in the Ethernet card itself. In order to verify this, consult the manufacturer
of the Ethernet card or a computer technician to determine whether or not the card
is defective. Repeat the preceding troubleshooting procedures on each new Ethernet
card installed.

Agile Enterprise Integration Software

Stone Bond Technologies, has released Version 7.0 of their core offering, Enterprise Enabler®.Stone Bond Technologies is a Microsoft Gold Partner and an award-winning agile integration software provider that offers effective solutions for a large variety of business challenges. Our core product, Enterprise Enabler, automates complex bi-directional aggregation, transformation and manipulation of entities among multiple line of business applications. Stone Bond's software can be used to dramatically reduce costs, improve business process productivity, and rapidly create the "agile" enterprise.

An established agile integration platform, Enterprise Enabler is now available in its next version with enhanced architecture and features, including a single application definition model instantly portable across ADO.Net, WSS 2.0/3.0 (Windows SharePoint Services), SharePoint Foundation 2010 (WSS 4.0), (MOSS) Microsoft Office SharePoint Services 2007, SharePoint 2010 and virtually any DOT.Net based application.
Enterprise Enabler enhances the capability of dashboards, business intelligence, analytics and SharePoint through standard ADO.Net interface, eliminating the need for staging databases by providing real time access to data aligned and merged from multiple sources. In the tradition of Enterprise Enabler and agile integration software, all of these capabilities are based on little or no programming, with a range of scalability from a low cost single use case to full enterprise deployment.
Enterprise Enabler Version 7.0 extends all SharePoint connectivity to access ANY data source, such as web services, Microsoft .NET Objects, MS Dynamics CRM, MS Dynamics AX, SAP, Salesforce.com, SQL, DB2, and many other applications. With codeless integration, the end user can visually build connectivity, create relationships across multiple sources, and map them to an ADO.Net object. By simply reading and writing to the Enterprise Enabler ADO.Net driver, data access and transformation is handled automatically behind the scenes, providing the same data access capabilities across all WSS that is available in SharePoint 2010 through the Business Connectivity Services (BCS), including write-back to data sources with full CRUD (Create, Read, Update and Delete) capabilities.
The IT (Information Technology) teams have a powerful connectivity tool to successfully complete integration initiatives without being forced to learn every completely different endpoint system or application they need to integrate. The business decision maker can establish an IT infrastructure behind the scenes with implementation at half the cost. For ISVs (Independent Software Vendors), Enterprise Enabler offers a completely embeddable and rebrandable technology with a highly flexible licensing model.”

Tuesday, August 31, 2010

XPCOM

XPCOM (Cross Platform Component Object Model)

XPCOM is Mozilla's cross-platform component object model. Although it is similar to Microsoft's COM technology, Essentially, when you program in a component-based environment, you do one of three things: you create a new component using existing components, write a component that implements other components, and establish interdependencies and a service network.

XPCOM similar to (Cross Platform Component Object Model) is a cross platform component modelCORBA or Microsoft COM. It has multiplelanguage bindings and IDL descriptions so programmers can plug their custom functionality into the framework and connect it with other components.

XPCOM is one of the main things that makes the Mozilla applicationenvironment an actual framework. It is a development environment that provides the following
features for the cross-platform software developer:

• Component management
• File abstraction
• Object message passing
• Memory management

This component object model makes virtually all of the functionality of Gecko available as a series of components, or reusable cross-platform libraries, that can be accessed from the web browser or scripted from any Mozilla application. Applications that want to access the various Mozilla XPCOM libraries (networking, security, DOM, etc.) use a special layer of XPCOM called XPConnect, which reflects the library interfaces into JavaScript (or other languages). XPConnect glues the front end to the C++ or C programming language-based components in XPCOM, and it can be extended to include scripting support for other languages: PyXPCOM already offers support for Python, PerlConnect provides support for Perl, and there are efforts underway to add .NET and Ruby language support for XPConnect.

On the developer side, XPCOM lets you write components in C++, C, JavaScript, Python, or other languages for which special bindings have been created, and compile and run those components on dozens of different platforms, including these and others where Mozilla itself is supported