Search Results

Search found 9822 results on 393 pages for 'hottest articles'.

Page 121/393 | < Previous Page | 117 118 119 120 121 122 123 124 125 126 127 128  | Next Page >

  • The Benefits of Website Creation Software

    Building your own website can be time consuming and costly if you are not technically inclined. But building one or more websites using site building software is the easy, quick and efficient way to do it for quicker profits.

    Read the article

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Programming Entity Framework, 2nd Edition (EF4) Table of Contents

    We are closing in on finalizing the 2nd edition of Programming Entity Framework! Although the rough draft chapters are already available through Safari’s Rough Cuts program (here: http://oreilly.com/catalog/9780596807252) I have been editing and reshaping the content since those chapters were published. You can get the final print edition (August 15th or perhaps a bit earlier) at O’Reilly or pre-order it here on Amazon.com (here) (and elsewhere of course!) I believe that the book will...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Expandable or Auto-Resize TextBox Height

    Recently, I was asked to prepare a Facebook like expandable textbox in a ASP.NET web application, where user can input text and the textbox can be re-sized (more specifically the height) dynamically. I searched for a while and found quite a lot of solutions that use jQuery (example). However, I was looking for something more intrinsic and simple, and finally I found another script on a forum that just use few lines of JavaScript codes: 1. Control declaration: <asp:TextBox ID="txtMsg"...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Understanding the Value of a DMOZ Submission

    The Open Directory Project (DMOZ) data powers the core directory services for many of the Internet's most influencial search engines and portals. However, Matt Cutts once said: "if you can't get into Dmoz, I wouldn't necessarily worry about it. There are a lot of other great places to get links across the web."

    Read the article

  • Four Tips to Improve SEO Writing

    How can you improve the quality of your company's SEO writing? Writing for the web takes a certain amount of skill as well as an understanding of how marketing works. These four tips can help you to connect with your audience and improve your rankings.

    Read the article

  • Is SEO Important For Every Business?

    Yes, Search Engine Optimization (SEO) is important for all types of businesses. Weather you have an e-commerce website or an informative website, static website or a dynamic website, SEO is beneficial for your online business promotion.

    Read the article

  • Shinkansen for ASP.NET MVC Now Available

    While building Morts and Elvises with MVC2, I cut over Shinkansen to support MVC syntax within views and master pages. I’ve included a sample MVC project, which you can either download from Codeplex or view online: view or download source code. In either case, peek inside Site.Master and you’ll see CSS includes at the top… <%= ShinkansenMvc.Includes (c = { c.AddCss ("~/assets/css/addthis_widget.css"); c.AddCss ("/assets/css/reset.css"); c.AddCss ("assets/css/sifr.css"); ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Visual Studio 2010 RC and Entity Framework 4 RC Support in the New Version of ADO.NET Data Providers

    Devart has recently announced the release of dotConnect products for Oracle, MySQL, PostgreSQL, and SQLite - ADO.NET providers that offer Entity Framework support, LINQ to SQL support, and contain an ORM model designer for developing LINQ to SQL and EF models based on different database engines. New dotConnect ADO.NET providers offer complete support for Visual Studio 2010 Release Candidate and Entity Framework 4 Release Candidate. Entity Developer 2.80, a designer for modeling and code generation...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Please Slap Me! What Is Google Slap?

    If you're new to SEO, Search Engine Optimization, you may be asking: "What in the Sam Hill is a Google Slap?" Well I'm glad you asked. I don't like the term because it implies that Google randomly punishes you for no reason.

    Read the article

  • Microsoft (Bing) Offers Innovative Approach to Search

    In seemingly constant evolution, Microsoft's search engine has not only been desperately seeking search engine market-share; but a brand and corporate identity as well. The most recent approach from Microsoft, describes Bing as a "decision engine". Bing endeavors to be the search engine that finds and organizes the answers you need, so you can make faster; more informed decisions.

    Read the article

  • High Search Engine Ranking Optimization Tips - Do it Yourself

    Have you been looking for a simple way to learn high search engine ranking optimization techniques that works? Look no further as I reveal the little secrets of increasing my page rank on Google within 30 days for virtually all my websites. After you are through with reading this article, you will be able to optimize your web pages with the right keywords without much hassle.

    Read the article

  • How to Promote Your Business With the Best SEO Services

    When you are about to hire an outsourcing company for SEO services, you should always choose a business provider who will be of your business level and share similar caliber as your company. This is because; having a business partner with the same caliber will allow the two companies to work mutually with each other with the same dedication levels and work ethics. These qualities are foremost factors you should keep in mind if you want to reap the fruits of success in your SEO business.

    Read the article

  • Search Engine Optimization Experts

    What are search engine optimization experts? This is a specialist that has a profound knowledge about search engines and they also have the ability to bring a website top ranking by applying targeted keywords as well as using various methods to generate higher sales.

    Read the article

  • How to Conduct Good SEO Keyword Research

    In order to be successful in your search engine marketing campaign, you need to do SEO keyword research. Knowing the best keywords to use in your internet marketing campaigns is crucial if you want to rank well for search terms that will drive traffic to your website. Fortunately, learning how to research keywords is not difficult at all.

    Read the article

  • Link Tracking

    Finding the correct way to utilize your link tracking software is actually a very simple task for even the green SEO learner. Everyone knows that you want to have as many links as possible pointing to your site to increase your rankings in the SERP's thus increasing the amount of traffic coming to your site via major search engines.

    Read the article

  • WordPress, Joomla Or Drupal Templates For Your Website

    Making the right choice for the perfect Content Management System in your new website is a very crucial decision. The differences in opinions offered by various webmasters varies based on their personal preferences. But, it is equally important for an online marketer to know and make his choice for the best Content Management System used in his new website.

    Read the article

< Previous Page | 117 118 119 120 121 122 123 124 125 126 127 128  | Next Page >