background preloader

Petri IT Knowledgebase

Petri IT Knowledgebase

Searching for the QoS Holy Grail With the convergence of voice, video and data in enterprise networks, and the increasing need to cut travel costs, both voice over IP and videoconferencing are becoming increasingly important. When coupled with the ever-present requirement that critical enterprise applications perform at their best, even in a fiscally tight environment, the days of "best effort" service are rapidly disappearing. Quality of service (QoS) is actually an ad hoc collection of technologies and techniques. This ad hoc nature is what has created a barrier to true end-to-end strategy. Some say adding bandwidth is effective in providing QoS. We set out to explore some different approaches and strategies of QoS, test different QoS appliances and discuss ways to implement QoS using equipment you already might own. For many companies, QoS appliances are the first step toward bringing QoS into the network where it is needed most - heavily congested WAN and Internet connections.

A Blog for TIBCO Architects, Developers, and Consultants Researched and written by Xmarter TIBCO Consultants Traditional deployment of business integration project requires a lot of configuration effort. The administrator needs to ensure that the configurations for multiple interactions are supported and configuration files are required for different components on different machines. All TIBCO BusinessWorks Projects undergo same project phase: design, deploy, and run. In using TIBCO Administrator GUI to deploy projects, an Enterprise Archive (EAR) file needs to be created using TIBCO Designer. TIBCO Administrator allows applications to be deployed multiple times. Once an application is deployed, TIBCO Administrator imports all the values defined for global variables from the EAR file. TIBCO Administrator enables administrator to manage deployed processes and services included in the application. Project deployment maybe a simple task but it’s at least as important as the project design. Components are implementations of web services.

/* Position Is Everything */ — Modern browser bugs explained in HOWTO undelete removed files and directories on an ext3 file sys Carlo Wood, Mar 2008 Introduction It happens to everyone sooner or later: a split second after you hit Enter you realize your mistake, but it's too late; you just deleted a valuable file or directory for which no backup exists. Or maybe you have a backup, but it's a month old... and in shock you see the past month flash before your eyes as you realize in pain what you'll have to do all over again... Fortunately, you remember that files are never really deleted, at most overwritten by new content. So, you remount the disk read-only as fast as possible. If you Google for "undelete ext3", almost every article you find will be users asking if it's possible and the answer is every time: no. The most frequently quoted passage comes from the ext3 FAQ itself: Q: How can I recover (undelete) deleted files from my ext3 partition? Actually, you can't! Your only hope is to "grep" for parts of your files that have been deleted and hope for the best. However, this is not necessarily true. Block sizes Groups

Using Googles Full Capabilities. « XBOX, XBOX 360, PS2, PS3, PSP, & MORE! – Your source for the latest in console modding. Well most of you use Google to probably look up porn. Other just search stuff. And others use Google to hack. Using Google, and some finely crafted searches we can find a lot of interesting information. For Example we can find: Credit Card Numbers Passwords Software / MP3′s …… (and on and on and on) Presented below is just a sample of interesting searches that we can send to google to obtain info that some people might not want us having.. Try a few of these searches: intitle:”Index of” passwords modified allinurl:auth_user_file.txt “access denied for user” “using password” “A syntax error has occurred” filetype:ihtml allinurl: admin mdb “ORA-00921: unexpected end of SQL command” inurl:passlist.txt “Index of /backup” “Chatologica MetaSearch” “stack tracking:” Amex Numbers: 300000000000000..399999999999999 MC Numbers: 5178000000000000..5178999999999999 visa 4356000000000000..4356999999999999 “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums ? Example: ?

How-To Geek - Computer Help from your Friendly How-To Geek SQL Server 2005 Part 3 - High Availability and Scalability Enhan In the previous article of this series, we started reviewing high availability and scalability enhancements in SQL Server 2005 (based on its recent Beta 2 release) by discussing database mirroring. In this article, we will continue exploring the same area of functionality, shifting our attention to failover clustering. We will also provide comparison of both features, which should help in recognizing the types of scenarios for which each of them is better suited. Failover clustering has been supported since SQL Server 7.0 so it is not surprising that its latest implementation is a combination of already familiar (and stable) technology with a number of useful improvements. As before, the solution is based on Microsoft Cluster Services (MSCS), which, starting with Windows 2000 Server became an integral part of Advanced (or Enterprise, in case of Windows 2003 Server) and DataCenter editions. Scalability of clustered SQL Server is limited due to a couple of factors. Power-ups for your browser Inderscience Publishers