background preloader

Petri IT Knowledgebase

Petri IT Knowledgebase

Searching for the QoS Holy Grail With the convergence of voice, video and data in enterprise networks, and the increasing need to cut travel costs, both voice over IP and videoconferencing are becoming increasingly important. When coupled with the ever-present requirement that critical enterprise applications perform at their best, even in a fiscally tight environment, the days of "best effort" service are rapidly disappearing. Quality of service (QoS) is actually an ad hoc collection of technologies and techniques. This ad hoc nature is what has created a barrier to true end-to-end strategy. Some say adding bandwidth is effective in providing QoS. We set out to explore some different approaches and strategies of QoS, test different QoS appliances and discuss ways to implement QoS using equipment you already might own. For many companies, QoS appliances are the first step toward bringing QoS into the network where it is needed most - heavily congested WAN and Internet connections.

A Blog for TIBCO Architects, Developers, and Consultants Researched and written by Xmarter TIBCO Consultants Traditional deployment of business integration project requires a lot of configuration effort. The administrator needs to ensure that the configurations for multiple interactions are supported and configuration files are required for different components on different machines. All TIBCO BusinessWorks Projects undergo same project phase: design, deploy, and run. In using TIBCO Administrator GUI to deploy projects, an Enterprise Archive (EAR) file needs to be created using TIBCO Designer. TIBCO Administrator allows applications to be deployed multiple times. Once an application is deployed, TIBCO Administrator imports all the values defined for global variables from the EAR file. TIBCO Administrator enables administrator to manage deployed processes and services included in the application. Project deployment maybe a simple task but it’s at least as important as the project design. Components are implementations of web services.

HOWTO undelete removed files and directories on an ext3 file sys Carlo Wood, Mar 2008 Introduction It happens to everyone sooner or later: a split second after you hit Enter you realize your mistake, but it's too late; you just deleted a valuable file or directory for which no backup exists. Or maybe you have a backup, but it's a month old... and in shock you see the past month flash before your eyes as you realize in pain what you'll have to do all over again... Fortunately, you remember that files are never really deleted, at most overwritten by new content. So, you remount the disk read-only as fast as possible. If you Google for "undelete ext3", almost every article you find will be users asking if it's possible and the answer is every time: no. The most frequently quoted passage comes from the ext3 FAQ itself: Q: How can I recover (undelete) deleted files from my ext3 partition? Actually, you can't! Your only hope is to "grep" for parts of your files that have been deleted and hope for the best. However, this is not necessarily true. Block sizes Groups

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” Amex Numbers: 300000000000000..399999999999999 MC Numbers: 5178000000000000..5178999999999999 visa 4356000000000000..4356999999999999 “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums ? Example: ?

SQL Server 2005 Part 3 - High Availability and Scalability Enhan In the previous article of this series, we started reviewing high availability and scalability enhancements in SQL Server 2005 (based on its recent Beta 2 release) by discussing database mirroring. In this article, we will continue exploring the same area of functionality, shifting our attention to failover clustering. We will also provide comparison of both features, which should help in recognizing the types of scenarios for which each of them is better suited. Failover clustering has been supported since SQL Server 7.0 so it is not surprising that its latest implementation is a combination of already familiar (and stable) technology with a number of useful improvements. As before, the solution is based on Microsoft Cluster Services (MSCS), which, starting with Windows 2000 Server became an integral part of Advanced (or Enterprise, in case of Windows 2003 Server) and DataCenter editions. Scalability of clustered SQL Server is limited due to a couple of factors.

Userscripts.org: Power-ups for your browser File Synchronization with Unison Unison is a file-synchronization tool that runs on Linux, UNIX and Microsoft Windows. Those of you who've used IBM Lotus Notes or Intellisync Mobile Suite probably have an idea of what synchronization is good for, as compared to one-way mirroring options such as rsync. You might have mirrored a company document directory to your laptop, for example, and then modified a document or two. Other people might have modified other documents in the same directory by the time you get back. With rsync, you'd need to reconcile the differences between the two directories manually or risk overwriting someone's changes. Unison can sort out what has changed where, propagate the changed files and even merge different changes to the same file if you tell it how. Think of Unison as two-way rsync with a bit of revision control mixed in. Getting, Compiling and Installing Unison Unison's home page is maintained at the University of Pennsylvania; the project leader, Benjamin C. Configuring and Using Unison

Learning Python, Linux, Java, Ruby and more with Videos, Tutorials and Screencasts Generating an SSL Certificate with Apache+mod_ssl Introduction This document is intended to be a quick guide to generating and installing an SSL certificate on an Apache web server with the mod_ssl module. While this is not an overly difficult process, it does involve running several long commands with numerous options. This document does not attempt to discuss compiling or installing Apache and mod_ssl. Brief SSL Primer This section will serve as a very brief introduction to SSL, the Secure Socket Layer. Normal web traffic is sent unencrypted over the Internet. SSL makes use of what is known as asymmetric cryptography, commonly referred to as public key cryptography (PKI). If SSL utilizes public key cryptography to encrypt the data stream traveling over the Internet, why is a certificate necessary? Generating a Private Key and CSR The openssl toolkit is used to generate an RSA Private Key and CSR (Certificate Signing Request). The first step is to create your RSA Private Key. $ openssl rsa -in server.key -out server.pem

Related: