Reverse proxy for Tomcat Project Plan
|
|
- Cory Hart
- 8 years ago
- Views:
Transcription
1 Reverse proxy for Tomcat Project Plan Anders Nyman June 10, 2005 Version 1.2 This project is now implemented, binary and source code can be found at
2 1 Introduction A reverse proxy is easily confused with a forward proxy which allows clients a proxy connection to the Internet. Instead a reverse proxy sits between your application servers and the Internet providing a proxy for all incoming connections to your application. Why do you need this kind of proxy, isn t it enough to have your application server directly connected behind a firewall? No, there are many advances gained when using a reverse proxy. Among them are the fact that you have a single point of entry where you can do all the filtering needed, add new application servers seamlessly or change their locations without the client noticing anything different. There is also a possibility of using a reverse proxy as a caching system, this is however not the specific goal of this project. Even if there are many benefits of using a reverse proxy there are also some negative aspects such as the risk of your proxy going down and taking the entire application with it or the fact that request will be handled a bit slower with a proxy in comparison to a client talking directly to the server. There are already methods one can use to get a reverse proxy with Tomcat. One popular way is by using apache and mod_proxy. However there is a need for a simple configurable proxy where you can add your own set of rules. Some people might also not feel comfortable using apache and think it is an unnecessary install just to get the proxy support. Therefore a web application implementing a reverse proxy will be made by extending the Rules and RulesChain setup from the balancer webapp. 2 Glossary Balancer The balancer webapp developed by Yoav Shapira and shipped with later versions of Tomcat 5.X. Rule Reference to the Rule class used in the balancer webapp. More generally a condition that if met tells the proxy what application server to use. RulesChain A list of rules that are traversed trying to find a matching one. 3 Project Organisation This is a one man project by Anders Nyman, Computer Science Student at Lunds Tekniska Högskola located in Lund, Sweden. Visit and for more information 3.1 Bio As a computer science student I like to have some side projects besides the schoolwork. Lately I have been coding on an J2EE framework. Sort of like Struts but where everything is defined directly in a database instead of XML 2
3 so that I can easily add web pages and change the permissions for them using a web interface. You might ask yourself why I didn t start extending Struts, but I really wanted to get down and try out some MVC things like using filters instead of servlets as the controller. Plus it s not as fun to start using Struts compared to coding your own MVC-framework. I have a good bit of experience coding J2EE applications with filters and servlets for Tomcat using an object orientated approach and have an overall good experience coding Java. I also have had some previous experience with filtering requests and think a reverse proxy might come in handy for my own work. This makes me a perfect candidate for implementing a reverse proxy. 4 Work Description The basis for the reverse proxy will be a new webapp depending on the existing balancer webapp for its rules, rule chaining and rules parser. Possibly the Rule classes might be refactored from the balancer and into a common package in order to have a common pool of classes for the both applications. The development method will be a bit of reuse when coding the rules and using an incremental style at large. The big increments are coding of the rules and creating a proxy. There are many steps to take in order to implement a reverse proxy and a specific division of the steps is quite hard to make. Even so the following tasks have been identified. T1 - Code a proxy. A reverse proxy obviously has to be made, this task is however only consisting of coding a quick sample filter that proxies all information to a specifed web server. Various coding solutions might be made as a start to identify a, from a performance view, good solutions. T2 - Identify and extract from balancer. Identify components in balancer that can be used for the proxy and extract them. T3 - Make XML digestion work. Make sure the proxy is easy configurable using a balancer type of mapping. T4 - Basic rules. Create a set of basic rules like IP filtering, filtering on query string, etc. T5 - Integrate proxy with rules. The proxy will have to be integrated with the rules. It should use the RulesChain or any equivalent for the purpose of identifying which rule is met. T6 - Documentation. A detailed documentation on how to setup the webapp, how to configure the included rules and also how to write your own rules are to be made following the guidelines for tomcat documentation. T7 - Composite Rule. A composite rule is a rule consisting of one or numerous other rules in order to allow many conditions to be met. An example is that requests should be sent to a specific server if the IP is in 3
4 range x.x and the request is made on a Friday, on a Thursday the same request should be sent to another server. This is a silly example but there is a need for a composite rule. T8 - XML configuration for composite rule The xml layout will probably have to look a bit different if a composite rule is made this might require changes to the XML digester. A special note might be made concerning T6 - Documentation, this task will be worked on continuously during the project. Instead of doing a big bang of documentation at the end, when a task is completed documentations concerning it will be written. This documentation also includes a complete javadoc for all classes and methods. 4.1 Deliverables A working reverse proxy with a set of rules for at least IP, URL, time, date and also a composite rule is to be delivered. A documentation for the entire webapp including javadoc shall also be included in the release. 5 Time Schedule The tasks are marked by the time it will take to complete them and also which tasked they depend on. Two releases are set for the project, one at the twentyninth of July in order to have an early release ready for the OSCON. A second and final release is made on the twenty-sixth of August leaving a few days to fix eventual bugs before the first September when the work should be finished. These releases are set in stone and will not change, however bare in mind that this is an estimate and all tasks might not be fully completed for the releases. Task Duration (days) Dependencies T1 6 None T2 2 None T3 4 T2 T4 4 T2 T5 4 T1, T4 T6 8 None T7 2 T4 T8 4 T7 Included in the first release are tasks T1-T3, T5 and a start of T4. For the last and final release T4 is completed and T6-T8 are added to the release. 6 Recording process All task process will be recorded as to how long time they took to finish and possible problems when implementing the tasks. The recording document can serve as a basis for future estimates and also make sure that tasks are being completed. 4
5 7 Revision history June Initial release. June Spelling and wording corrected. June Switched to L A TEX for a nicer layout. 5
Ruby on Rails. a high-productivity web application framework. blog.curthibbs.us/ http://blog. Curt Hibbs <curt@hibbs.com>
Ruby on Rails a high-productivity web application framework http://blog blog.curthibbs.us/ Curt Hibbs Agenda What is Ruby? What is Rails? Live Demonstration (sort of ) Metrics for Production
More informationWeb. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
More informationCrawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
More informationMastering Tomcat Development
hep/ Mastering Tomcat Development Ian McFarland Peter Harrison '. \ Wiley Publishing, Inc. ' Part I Chapter 1 Chapter 2 Acknowledgments About the Author Introduction Tomcat Configuration and Management
More informationIn this chapter, we lay the foundation for all our further discussions. We start
01 Struts.qxd 7/30/02 10:23 PM Page 1 CHAPTER 1 Introducing the Jakarta Struts Project and Its Supporting Components In this chapter, we lay the foundation for all our further discussions. We start by
More informationJAVA/J2EE DEVELOPER RESUME
1 of 5 05/01/2015 13:22 JAVA/J2EE DEVELOPER RESUME Java Developers/Architects Resumes Please note that this is a not a Job Board - We are an I.T Staffing Company and we provide candidates on a Contract
More informationA Talk ForApacheCon Europe 2008
a talk for ApacheCon Europe 2008 by Jeremy Quinn Break My Site practical stress testing and tuning photo credit: Môsieur J This is designed as a beginner s talk. I am the beginner. 1 I will present two
More informationApache Tomcat & Reverse Proxies
Apache Tomcat & Reverse Proxies Mark Thomas, Staff Engineer 2012 SpringSource, by VMware. All rights reserved Agenda Introductions What is a reverse proxy? Protocol selection httpd module selection Connector
More informationMike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man?
Mike: Alright welcome to episode three of Server Talk, I m here with Alexey. I m Mike. Alexey, how are things been going, man? Alexey: They re doing pretty good. Yeah, I don t know, we ve launched two
More informationApache Tomcat. Tomcat Clustering: Part 2 Load balancing. Mark Thomas, 15 April 2015. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Tomcat Clustering: Part 2 Load balancing Mark Thomas, 15 April 2015 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet,
More informationEsigate Module Documentation
PORTAL FACTORY 1.0 Esigate Module Documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels to truly control
More informationInstallation Guide for contineo
Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................
More informationCreating Web Services Applications with IntelliJ IDEA
Creating Web Services Applications with IntelliJ IDEA In this tutorial you will: 1. 2. 3. 4. Create IntelliJ IDEA projects for both client and server-side Web Service parts Learn how to tie them together
More informationOracle9i Application Server: Options for Running Active Server Pages. An Oracle White Paper July 2001
Oracle9i Application Server: Options for Running Active Server Pages An Oracle White Paper July 2001 Oracle9i Application Server: Options for Running Active Server Pages PROBLEM SUMMARY...3 INTRODUCTION...3
More informationDeveloping Web Services with Eclipse
Developing Web Services with Eclipse Arthur Ryman IBM Rational ryman@ca.ibm.com Page Abstract The recently created Web Tools Platform Project extends Eclipse with a set of Open Source Web service development
More informationVOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
More informationWEB APPLICATION DEVELOPMENT. UNIT I J2EE Platform 9
UNIT I J2EE Platform 9 Introduction - Enterprise Architecture Styles - J2EE Architecture - Containers - J2EE Technologies - Developing J2EE Applications - Naming and directory services - Using JNDI - JNDI
More informationApache Tomcat. Load-balancing and Clustering. Mark Thomas, 20 November 2014. 2014 Pivotal Software, Inc. All rights reserved.
2 Apache Tomcat Load-balancing and Clustering Mark Thomas, 20 November 2014 Introduction Apache Tomcat committer since December 2003 markt@apache.org Tomcat 8 release manager Member of the Servlet, WebSocket
More informationmkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from
Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS
More informationPenetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (Internal Attacker - Beginner version) By: magikh0e - magikh0e@ihtb.org Last Edit: July 07 2012 This guide assumes a few things... 1. You have installed Backtrack before
More informationFTP, IIS, and Firewall Reference and Troubleshooting
FTP, IIS, and Firewall Reference and Troubleshooting Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the Windows Firewall, the
More informationHigh Level Design Distributed Network Traffic Controller
High Level Design Distributed Network Traffic Controller Revision Number: 1.0 Last date of revision: 2/2/05 22c:198 Johnson, Chadwick Hugh Change Record Revision Date Author Changes 1 Contents 1. Introduction
More informationBinonymizer A Two-Way Web-Browsing Anonymizer
Binonymizer A Two-Way Web-Browsing Anonymizer Tim Wellhausen Gerrit Imsieke (Tim.Wellhausen, Gerrit.Imsieke)@GfM-AG.de 12 August 1999 Abstract This paper presents a method that enables Web users to surf
More informationTomcat 5 New Features
Tomcat 5 New Features ApacheCon US 2003 Session MO10 11/17/2003 16:00-17:00 Craig R. McClanahan Senior Staff Engineer Sun Microsystems, Inc. Slides: http://www.apache.org/~craigmcc/ Agenda Introduction
More informationDTWMS Required Software Engineers. 1. Senior Java Programmer (3 Positions) Responsibilities:
DTWMS Required Software Engineers 1. Senior Java Programmer (3 Positions) Responsibilities: Responsible to deliver quality software solutions using standard end to end software development cycle Collaborate
More informationChapter -5 SCALABILITY AND AVAILABILITY
Chapter -5 SCALABILITY AND AVAILABILITY 78 CHAPTER 5 Chapter - 5. Scalability and Availability S.No. Name of the Sub-Title Page No. 5.1 The importance of Scalability and Availability 79 5.2. Design Patterns
More informationIST Amigo Project. Accounting & Billing Software Developer s Guide. Public
IST Amigo Project Accounting & Billing Software Developer s Guide Project Number : IST-004182 Project Title : Amigo Deliverable Type : Report Deliverable Number : Title of Deliverable : Nature of Deliverable
More informationIntegrating the F5 BigIP with Blackboard
Integrating the F5 BigIP with Blackboard Nick McClure nickjm@uky.edu Lead Systems Programmer University of Kentucky Created August 1, 2006 Last Updated June 17, 2008 Integrating the F5 BigIP with Blackboard
More informationInstallation Guide For ChoiceMail Enterprise Edition
Installation Guide For ChoiceMail Enterprise Edition How to Install ChoiceMail Enterprise On A Server In Front Of Your Company Mail Server August, 2004 Version 2.6x Copyright DigiPortal Software, 2002-2004
More informationDatabase manager does something that sounds trivial. It makes it easy to setup a new database for searching with Mascot. It also makes it easy to
1 Database manager does something that sounds trivial. It makes it easy to setup a new database for searching with Mascot. It also makes it easy to automate regular updates of these databases. 2 However,
More informationEnterprise Service Bus
We tested: Talend ESB 5.2.1 Enterprise Service Bus Dr. Götz Güttich Talend Enterprise Service Bus 5.2.1 is an open source, modular solution that allows enterprises to integrate existing or new applications
More informationIntelligent Log Analyzer. André Restivo <andre.restivo@portugalmail.pt>
Intelligent Log Analyzer André Restivo 9th January 2003 Abstract Server Administrators often have to analyze server logs to find if something is wrong with their machines.
More informationSolr Bridge Search Installation Guide
Solr Bridge Search Installation Guide Table of contents 1. Solr Installation 1.1 Tomcat6 (Web server) installation. 1.2 Apache Solr 3.3.0 installation. 1.3 Install SolrBirge package (preconfigured solr
More informationShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie
ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes
More informationCourse Number: IAC-SOFT-WDAD Web Design and Application Development
Course Number: IAC-SOFT-WDAD Web Design and Application Development Session 1 (10 Hours) Client Side Scripting Session 2 (10 Hours) Server Side Scripting - I Session 3 (10 hours) Database Session 4 (10
More informationLogHostname Documentation
LogHostname Documentation (The following graphics are screen shots from Microsoft ISA Server 2006 which is the property of Microsoft Corp. and are included here for instructive use. Some images illustrate
More informationConnecting to Delta College Exchange services off-campus
Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationEffective feedback from quality tools during development
Effective feedback from quality tools during development EuroSTAR 2004 Daniel Grenner Enea Systems Current state Project summary of known code issues Individual list of known code issues Views targeted
More informationJAVA. EXAMPLES IN A NUTSHELL. O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo. Third Edition.
"( JAVA. EXAMPLES IN A NUTSHELL Third Edition David Flanagan O'REILLY 4 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Preface xi Parti. Learning Java 1. Java Basics 3 Hello
More informationDesign Approaches of Web Application with Efficient Performance in JAVA
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.7, July 2011 141 Design Approaches of Web Application with Efficient Performance in JAVA OhSoo Kwon and HyeJa Bang Dept
More informationIP Phone Services Configuration
CHAPTER 96 Using Cisco Unified Communications Manager Administration, you define and maintain the list of IP phone services to which users can subscribe at their site. IP phone services comprise XML applications
More informationInstalling Behind a Firewall or Proxy
LISTSERV Maestro Admin Tech Doc 7 Installing Behind a Firewall or Proxy June 5, 2015 L-Soft Sweden AB lsoft.com This document is a LISTSERV Maestro Admin Tech Doc. Each admin tech doc documents a certain
More informationConnecting Custom Services to the YAWL Engine. Beta 7 Release
Connecting Custom Services to the YAWL Engine Beta 7 Release Document Control Date Author Version Change 25 Feb 2005 Marlon Dumas, 0.1 Initial Draft Tore Fjellheim, Lachlan Aldred 3 March 2006 Lachlan
More informationTesting Network Performance with Real Traffic
Testing Network Performance with Real Traffic Mike Danseglio 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the
More informationIntroduction to WebSphere Administration
PH073-Williamson.book Page 1 Thursday, June 17, 2004 3:53 PM C H A P T E R 1 Introduction to WebSphere Administration T his book continues the series on WebSphere Application Server Version 5 by focusing
More informationPerformance Analysis of Web based Applications on Single and Multi Core Servers
Performance Analysis of Web based Applications on Single and Multi Core Servers Gitika Khare, Diptikant Pathy, Alpana Rajan, Alok Jain, Anil Rawat Raja Ramanna Centre for Advanced Technology Department
More informationMEDIABURST: SMS GUIDE 1. SMS Guide
MEDIABURST: SMS GUIDE 1 SMS Guide MEDIABURST: SMS GUIDE 2 Contents Introduction 3 This guide will cover 3 Why use SMS in business? 4 Our products 5 How do I add existing contacts? 6 Who are you sending
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationWeb-JISIS Reference Manual
23 March 2015 Author: Jean-Claude Dauphin jc.dauphin@gmail.com I. Web J-ISIS Architecture Web-JISIS Reference Manual Web-JISIS is a Rich Internet Application (RIA) whose goal is to develop a web top application
More informationADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5
ADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5 Legal notices Copyright 2011 Adobe Systems Incorporated and its licensors. All rights reserved. Administering Adobe LiveCycle Mosaic 9.5 March 31, 2011 This administering
More informationT320 E-business technologies: foundations and practice
T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static
More informationChapter Thirteen (b): Using Active Directory Integration
Chapter Thirteen (b): Using Active Directory Integration Summary of Chapter: How to add a User to your Net/Cache/SecurePilot that will match your Active Directory Security Group. How to set-up your Net/Cache/SecurePilot
More informationReference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
More information24-Hour Road Service Mobile Apps
24-Hour Road Service Mobile Apps Project Plan Fall 2011 Michigan State University Computer Science and Engineering Capstone Team Members: Paul Fritschen Justin Hammack Lingyong Wang Contents 1. Auto-Owners
More informationSubnetting Examples. There are three types of subnetting examples I will show in this document:
Subnetting Examples There are three types of subnetting examples I will show in this document: 1) Subnetting when given a required number of networks 2) Subnetting when given a required number of clients
More informationMID-TIER DEPLOYMENT KB
MID-TIER DEPLOYMENT KB Author: BMC Software, Inc. Date: 23 Dec 2011 PAGE 1 OF 16 23/12/2011 Table of Contents 1. Overview 3 2. Sizing guidelines 3 3. Virtual Environment Notes 4 4. Physical Environment
More informationIUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationCORISECIO. Quick Installation Guide Open XML Gateway
Quick Installation Guide Open XML Gateway Content 1 FIRST STEPS... 3 2 INSTALLATION... 3 3 ADMINCONSOLE... 4 3.1 Initial Login... 4 3.1.1 Derby Configuration... 5 3.1.2 Password Change... 6 3.2 Logout...
More informationFacility Connect API: Setup & Troubleshooting. Version 1
Facility Connect API: Setup & Troubleshooting Version 1 All copyright and other intellectual property rights in all text, images and course materials are owned by Advanced Learning or are included with
More informationWeb Development on the SOEN 6011 Server
Web Development on the SOEN 6011 Server Stephen Barret October 30, 2007 Introduction Systems structured around Fowler s patterns of Enterprise Application Architecture (EAA) require a multi-tiered environment
More informationCollax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
More informationIntro to Load-Balancing Tomcat with httpd and mod_jk
Intro to Load-Balancing Tomcat with httpd and mod_jk Christopher Schultz Chief Technology Officer Total Child Health, Inc. * Slides available on the Linux Foundation / ApacheCon2015 web site and at http://people.apache.org/~schultz/apachecon
More informationImplementing SQI via SOAP Web-Services
IST-2001-37264 Creating a Smart Space for Learning Implementing SQI via SOAP Web-Services Date: 10-02-2004 Version: 0.7 Editor(s): Stefan Brantner, Thomas Zillinger (BearingPoint) 1 1 Java Archive for
More informationChapter Four: How to Collaborate and Write With Others
Chapter Four: How to Collaborate and Write With Others Why Collaborate on Writing? Considering (and Balancing) the Two Extremes of Collaboration Peer Review as Collaboration * A sample recipe for how peer
More informationEnterprise Application Monitoring with
Enterprise Application Monitoring with 11/10/2007 Presented by James Peel james.peel@altinity.com / www.altinity.com 1 Who am I? James Peel - james.peel@altinity.com Job: Managing Director of Altinity
More informationA better way to manage your email marketing clients
A better way to manage your email marketing clients When you need help Expert support is all part of the Instiller service and before you get started it s a great time to let you know exactly how it works.
More information<Insert Picture Here> Oracle Web Cache 11g Overview
Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content
More informationE-Mail Marketing with OpenEMM. Installation, Configuration and Operation
E-Mail Marketing with OpenEMM Installation, Configuration and Operation AGENDA E-Mail Marketing with OpenEMM Introduction to OpenEMM Demonstration of OpenEMM OpenEMM Installation + Configuration Bounce
More informationServer Setup and Configuration
Server Setup and Configuration 1 Agenda Configuring the server Configuring your development environment Testing the setup Basic server HTML/JSP Servlets 2 1 Server Setup and Configuration 1. Download and
More informationHow to translate your website. An overview of the steps to take if you are about to embark on a website localization project.
How to translate your website An overview of the steps to take if you are about to embark on a website localization project. Getting Started Translating websites can be an expensive and complex process.
More informationPerformance Optimization For Operational Risk Management Application On Azure Platform
Performance Optimization For Operational Risk Management Application On Azure Platform Ashutosh Sabde, TCS www.cmgindia.org 1 Contents Introduction Functional Requirements Non Functional Requirements Business
More informationAdding Content to the Tomcat Server
LISTSERV Maestro Admin Tech Doc 12 Adding Content to the Tomcat Server May 23, 2014 L-Soft Sweden AB lsoft.com This document is a LISTSERV Maestro Admin Tech Doc. Each admin tech doc documents a certain
More informationD5.4.4 Integrated SemaGrow Stack API components
ICT Seventh Framework Programme (ICT FP7) Grant Agreement No: 318497 Data Intensive Techniques to Boost the Real Time Performance of Global Agricultural Data Infrastructures Deliverable Form Project Reference
More informationAndroid Based Mobile Gaming Based on Web Page Content Imagery
Spring 2011 CSIT691 Independent Project Android Based Mobile Gaming Based on Web Page Content Imagery TU Qiang qiangtu@ust.hk Contents 1. Introduction... 2 2. General ideas... 2 3. Puzzle Game... 4 3.1
More informationJava/J2EE or Web Developer. Formal Education. Technical knowledge. Spoken Languages
Jonathan ROUSSEAU 27 years old (3 rd of February 1983) Bruyères, 15/A 4950 Waimes +32 (473) 69 82 42 Jrousseau.webco@gmail.com http://www.jrousseau.be Java/J2EE or Web Developer Formal Education 2000:
More informationProxySG TechBrief Implementing a Reverse Proxy
ProxySG TechBrief Implementing a Reverse Proxy What is a reverse proxy? The Blue Coat ProxySG provides the basis for a robust and flexible Web communications solution. In addition to Web policy management,
More informationImplementation of Web Application Firewall
Implementation of Web Application Firewall OuTian 1 Introduction Abstract Web 層 應 用 程 式 之 攻 擊 日 趨 嚴 重, 而 國 內 多 數 企 業 仍 不 知 該 如 何 以 資 安 設 備 阻 擋, 仍 在 採 購 傳 統 的 Firewall/IPS,
More informationConfiguring CitectSCADA SNMP projects with MIB2CIT. A reference for CitectSCADA Customers
Configuring CitectSCADA SNMP projects with MIB2CIT A reference for CitectSCADA Customers support@citect.com Revision 1.00 Created 28-12-2009 Document revision history Please update this table whenever
More informationTG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
More informationHow to Get Your Website on the Internet: Web Hosting Basics
The Web Host Advisor How to Get Your Website on the Internet: Web Hosting Basics Copyright 2012 by The Web Host Advisor Table of Contents Why Do You Want a Website page 3 What Kind of Website do You Want?
More informationHandling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2
White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines
More informationWeb Frameworks. web development done right. Course of Web Technologies A.A. 2010/2011 Valerio Maggio, PhD Student Prof.
Web Frameworks web development done right Course of Web Technologies A.A. 2010/2011 Valerio Maggio, PhD Student Prof.ssa Anna Corazza Outline 2 Web technologies evolution Web frameworks Design Principles
More informationHow To Link Tomcat 5 with IIS 6 on Windows 2003 Server using the JK2 ajp13 connector
How To Link Tomcat 5 with IIS 6 on Windows 2003 Server using the JK2 ajp13 connector Copyright 2003 TJ and 2XP Group (uk.co.2xp@tj.support) Contents 1. History 2. Introduction 3. Summary 4. Prerequisites
More informationIntroducing Xcode Source Control
APPENDIX A Introducing Xcode Source Control What You ll Learn in This Appendix: u The source control features offered in Xcode u The language of source control systems u How to connect to remote Subversion
More informationTest Driven Development
Test Driven Development Introduction Test Driven development (TDD) is a fairly recent (post 2000) design approach that originated from the Extreme Programming / Agile Methodologies design communities.
More informationDreamFactory & Modus Create Case Study
DreamFactory & Modus Create Case Study By Michael Schwartz Modus Create April 1, 2013 Introduction DreamFactory partnered with Modus Create to port and enhance an existing address book application created
More informationThe next page is the really clever bit! Here you run through a series of options about
Page 1 of 8 Welcome to MM&M UG UK Sign in Join Help Nathan's Exchange Blog Hi, This blog will be almost entirely Exchange and Mobility focused. I hope to provide regular content which will range from longer
More informationJRuby The enterprise ruby
JRuby The enterprise ruby Stefan Magnus Landrø RubyFools Oslo 3. April 2008 Agenda Introduction to JRuby Java Integration JRuby on Rails Deployment Real life JRuby on Rails Q&A Side 2 Introduction - History
More informationFoundations for your. portable cloud
Foundations for your portable cloud Start Today Red Hat s cloud vision is unlike that of any other IT vendor. We recognize that IT infrastructure is and will continue to be composed of pieces from many
More informationITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
More informationESB pilot project at the FMI
ESB pilot project at the FMI EGOWS 2008 Pekka Rantala Finnish Meteorological Institute Contents 1) What is it? 2) Why do we want to look at it? 3) What did we set out to do? 4) What did we actually do?
More informationPenetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
More informationBuilding Web Applications, Servlets, JSP and JDBC
Building Web Applications, Servlets, JSP and JDBC Overview Java 2 Enterprise Edition (JEE) is a powerful platform for building web applications. The JEE platform offers all the advantages of developing
More informationAuthor: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial
Simple Implementation of a WebService using Eclipse Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Contents Web Services introduction
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationLoad Balancing using Pramati Web Load Balancer
Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much
More informationWhat is Web Security? Motivation
brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
More informationA Guide to Getting Started with Successful Load Testing
Ingenieurbüro David Fischer AG A Company of the Apica Group http://www.proxy-sniffer.com A Guide to Getting Started with Successful Load Testing English Edition 2007 All Rights Reserved Table of Contents
More information