MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Linux Journal
July 2000
Reuven M. Lerner
At the Forge To learn more about building dynamic web sites, Mr. Lerner presents an application for reading the news using Mason and MySQL. mark for My Articles similar articles
Linux Journal
June 2000
Reuven M. Lerner
At the Forge Building Sites with Mason: This month, Mr. Lerner introduces us to a mod_perl module to aid in building large, dynamic web sites. mark for My Articles similar articles
JavaWorld
December 2000
Thomas E. Davis, Craig Walker
Take control of the servlet environment, Part 2 Implement a wrapper that gives you greater control over session management. Session state can be stored in the browser, in the server's memory, or in the database. You can have all three solutions at your fingertips, painlessly interchangeable... mark for My Articles similar articles
Linux Journal
October 2001
Reuven M. Lerner
Data Modeling with Alzabo How to bridge the object-relational gap with the Perl module Alzabo... mark for My Articles similar articles
Linux Journal
March 2000
Reuven M. Lerner
At the Forge: Consumer Rankings How to use CGI programs to allow list subscribers to enter and rank their favorite products or services. mark for My Articles similar articles
JavaWorld
April 2002
Michael Juntao Yuan & Ju Long
Track wireless sessions with J2ME/MIDP Every e-commerce application must support session tracking. Unfortunately, MIDP, a J2ME technology, supports only the standard HTTP protocol, which is stateless. This article explores ways to add session support into the current MIDP network API framework... mark for My Articles similar articles
Linux Journal
September 2000
Reuven M. Lerner
At the Forge: Content Management Keep track of updates to your web site documents with this Mason application. mark for My Articles similar articles
Linux Journal
March 29, 2007
Mike Diehl
Writing Web Applications with Web Services and Ajax An Ajax primer with Perl and PostgreSQL. mark for My Articles similar articles
Linux Journal
December 1, 2006
Reuven Lerner
Ajax Application Design Asynchronous is the operative word with Ajax, and here's what it's all about. mark for My Articles similar articles
JavaWorld
January 2002
Yuan & Long
Build database-powered mobile applications on the Java platform This article explains how to create mobile database applications using the Java 2 Platform, Micro Edition/Mobile Information Device Profile (J2ME/MIDP) and the Java 2 Platform, Enterprise Edition (J2EE). The authors introduce an architecture that uses JavaServer Pages (JSPs) as middleware between a MIDP frontend and a database backend. They also explain specific design decisions and implementation issues, such as persistent storage, network connection, session management, and data communication. Their discussion focuses on the integration between the client and server-side Java applications. mark for My Articles similar articles
Linux Journal
July 1, 2007
Robb Shecter
Role-Based Single Sign-on with Perl and Ruby Single sign-on dictated by user roles with Perl and Ruby: This simple collection of a few short Web scripts provides a surprising array of benefits. mark for My Articles similar articles
JavaWorld
January 2001
Thomas E. Davis & Craig Walker
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... mark for My Articles similar articles
Linux Journal
September 30, 2006
Reuven Lerner
At the Forge - Beginning Ajax How to put the A (asynchronous) in Ajax. mark for My Articles similar articles
Linux Journal
April 2000
Nalneesh Gaur
Assessing the Security of Your Web Applications An outline of key test areas to identify security issues in a web application and provide measures to minimize them. mark for My Articles similar articles
Linux Journal
May 1, 2007
Reuven Lerner
Open-Source Databases, Part II: PostgreSQL Feature-rich PostgreSQL delivers on database integrity. mark for My Articles similar articles
New Architect
April 2002
Al Williams
A Cookie by Any Other Name Is it safe to use cookies again? mark for My Articles similar articles
Linux Journal
October 9, 2001
Eric Rescorla
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... mark for My Articles similar articles
Linux Journal
November 2001
Michael Yuan
Linux in Education: Implementing a Research Knowledge Base Keeping up with large volumes of research requires a system both flexible and intuitive... mark for My Articles similar articles
Linux Journal
January 1, 2007
Reuven Lerner
At the Forge - Prototype Prototype eases the burden of using JavaScript in Ajax. mark for My Articles similar articles
JavaWorld
April 2002
Sonal Bansal
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... mark for My Articles similar articles
New Architect
August 2002
Steven Champeon
Debugging Web Applications Ensuring quality by finding and fixing bugs. mark for My Articles similar articles
Linux Journal
April 2000
Reuven M. Lerner
At the Forge: Designing Databases Structuring tables can improve database performance--here's how to do it. mark for My Articles similar articles
JavaWorld
April 2001
Kelly Davis & Robert Di Marco
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... mark for My Articles similar articles
D-Lib
Jul/Aug 2000
Thornton Staples & Ross Wayland
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. mark for My Articles similar articles
Linux Journal
February 2001
Dan Teodor
Web Servers and Dynamic Content Using legacy languages like C and Fortran can aid computationally complex web applications... mark for My Articles similar articles
Linux Journal
August 1, 2007
Tony Kay
AlphaMail Is Scalable and Accessible Web Mail AlphaMail is a high-performance, feature-rich, open-source Web mail system. mark for My Articles similar articles
JavaWorld
August 2001
Rinaldo Di Giorgio
Serve clients' specific protocol requirements with Brazil, Part 5 How to use Brazil to process content from diverse Websites, tailor the content to reflect a user's desires, and provide the content as a Web service -- and how to use Brazil to integrate new technologies with legacy Web applications that aren't XML-enabled... mark for My Articles similar articles
PC Magazine
September 2, 2003
Warren Ernst
Making Cookies Despite their bad press, cookies are a good way to personalize a visitor's experience at your site. We show you how to start using them. mark for My Articles similar articles
Linux Journal
February 1, 2007
Irfan Habib
Integrating PHP and Perl PHP and Perl are both so powerful, they can even run each other. mark for My Articles similar articles
Linux Journal
May 2000
Reuven M. Lerner
At the Forge: Creating Queries Don't be afraid of large joins--learn to generate complex SQL queries from easy-to-use interfaces. Integrating your database with a website. mark for My Articles similar articles
Linux Journal
February 1, 2004
Giovanni Organtini
The REDACLE Work-Flow Management System A MySQL-based system handles the data management, quality control and bookkeeping for building a new scientific instrument with 500,000 parts. Here's how you can adapt it for your manufacturing process too. mark for My Articles similar articles
PC World
April 2006
Scott Spanbauer
Take Charge of What Web Sites Know About You Control cookies, clear your download history, and take other steps to keep snoops off your online trail. mark for My Articles similar articles
Linux Journal
April 1, 2007
Girish Venkatachalam
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. mark for My Articles similar articles
JavaWorld
January 2002
Jason Cai
Combine the Session Facade pattern with XML This article explores the benefits and advantages of using the Session Facade pattern. The author discusses when to use the pattern with value objects, and when to use it with XML. He also provides a detailed implementation of the Session Facade pattern integrated with XML... mark for My Articles similar articles
Linux Journal
May 1, 2007
Marcel Gagne
Cooking with Linux - When Ajax Held the World on His Shoulders How to install Ajax-based chat programs GroChat and AjaxChat on your webserver. mark for My Articles similar articles
PC World
June 1, 2000
Matt Lake
Privacy Special Report: Stealth Surfing All right already, we all know there's no privacy on the Web. Online intrusion is like the proverbial weather--everybody talks about it, but nobody ever seems to do anything about it. mark for My Articles similar articles
Linux Journal
January 1, 2003
Adam Lazur
Power Sessions with Screen Screen is a terminal multiplexer that allows you to manage many processes through one physical terminal. Each process gets its own virtual window, and you can bounce between virtual windows interacting with each process. mark for My Articles similar articles
InternetNews
October 19, 2005
Sean Michael Kerner
Apache Updates HTTP Servers Open source foundation issues new releases of both branches of the Apache HTTP Web server. mark for My Articles similar articles
PC World
March 26, 2001
Dennis O'Reilly
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... mark for My Articles similar articles
Linux Journal
June 2000
Bill Cunningham
Book Review Programming the Perl DBI, by Alligator Descartes and Tim Bunce mark for My Articles similar articles
InternetNews
December 21, 2007
Sean Gallagher
With Google/DoubleClick Approved, is Privacy Dead? The Google-DoubleClick merger creates a uniquely large single lightning rod for privacy activists to get up in arms over. mark for My Articles similar articles
PC Magazine
November 14, 2007
Neil J. Rubenking
Find Unique Rows in Excel Stop searching for new or special entries in Excel by telling the software to how to do the hunting and highlighting for you. mark for My Articles similar articles
JavaWorld
October 2002
Maven ties together tools for better code management Maven is an open source build tool from the Apache Jakarta Project that manages your code at the project level. Maven creates effective documentation by integrating many third-party open source code analysis tools into a coherent generated Website. mark for My Articles similar articles
InternetNews
March 9, 2010
Blue Coat Backing Armored Browser Networking and security firm offers commercial support for Quaresso, a startup offering a new spin on the armored browser with remote support to shore up the last mile. mark for My Articles similar articles
PC World
April 2003
Scott Spanbauer
Internet Tips: Protect Your PC and Data With the Security Checklist Follow these essential steps for your PC security. mark for My Articles similar articles
Linux Journal
February 7, 2002
Jack Dennon
A Bison Tutorial: Do We Shift or Reduce? A shift-reduce conflict is the result of an ambiguity in the grammatical specification of a language, in our case, a programming language. The terms "shift" and "reduce" are explained in the course of this article... mark for My Articles similar articles
PC World
November 9, 2001
Jennifer DiSabatino
IE Hole Reveals Users' Cookie Data Microsoft is working on patch, but for now malicious sites could siphon information from IE 5.5 and 6.0... mark for My Articles similar articles
PC World
April 9, 2001
Andrew Brandt
Eyes on the Spies Here's how to stop the three most common methods snoops use to monitor you on the Internet... mark for My Articles similar articles
Information Today
November 2000
Donald T. Hawkins
Online World 2000-The End of an Era When Susan M. Klopper asked me to be one of the four panelists in the Schmoozin' with Susan: (W)Rap Session at the end of the Online World 2000 conference, I didn't know that it would be the last wrap session in the 22-year history of this event... mark for My Articles similar articles
PC World
September 2004
Stan Miastkowski
Cut the Clutter and Add Power to Your Browser Web browsers can use substantial amounts of computer resources, and their temporary files can hog huge amounts of disk space. Updates, add-ons, housekeeping--and even using an alternative browser--can improve your surfing experience. mark for My Articles similar articles