Ten from IBM — Linux dev, packet capturing, Wine, databases, Python, autonomic computing . . .
Apr 16, 2004 — by LinuxDevices Staff — from the LinuxDevices Archive — viewsIBM has published the following technical articles, tutorials, and downloads on its developerWorks Website. They cover a range of interesting (though not necessarily embedded) technical topics. Some require free registration. Enjoy . . .
- Webcast: Software Development Platform for Linux — April 28, 2004, at 11 a.m. EST — This Webcast will help clarify what you should know - best practices, tools, technical capabilities that the solution has to provide. This session will provide a high-level description of the Linux solution across the complete development lifecycle for business applications and IT, software products, and systems development organizations.
- Network packet capturing for Linux — This intermediate tutorial covers different mechanisms for capturing and manipulating packets. Security applications — such as VPNs, firewalls, and sniffers, and network apps such as routers — rely on methods like those described here to do their work. Once you have the hang of them, you will rely on them too. You won't want to miss this tutorial all about packet interception, covering kernels from 2.2.x to the present and techniques from divert socket and netfilter to interrupt handling and messing with the kernel source code itself.
- A taste of Wine: Transition from Windows to Linux — A fascinating and ambitious open source project, Wine attempts to solve the complex problem of running Windows executables on Linux. Although Wine is not a new project, the growing expectations for the Linux desktop and growing demand for Linux applications make it relevant today.
- Write code that is transactionaly persistent and database-vendor agnostic — Just when you think you've got your developer tools all sorted out, a fresh crop is sure to emerge. This article uses a real-world example to introduce you to two of the most exciting new technologies for the enterprise. Hibernate is an object-relation mapping tool and Spring is an AOP framework and IOC container. Follow along as it shows you how to combine the two to build a transactional persistence tier for your enterprise applications and write code that is database-vendor agnostic, and that can run inside of a J2EE container or run standalone.
- DB2 V8 Application Development cert prep – Database objects and programming methods — This article looks at Python's two standard modules for unit testing: unittest and doctest. These modules expand on the capability of the built-in assert statement, which is used for validation of pre-conditions and post-conditions within functions. The author discusses the best ways to incorporate testing into Python development, weighing the advantages of different styles for different types of projects.
- Build a grid with Perl, Part 3: Metadata — This tutorial is the third in a series of tutorials looking at how you can develop a grid solution with Perl. This series looks at building a framework for a grid system while also creating a distributed image storage/retrieval system as a sample grid application. This tutorial concentrates on the metadata — data about data — which is used in a grid to control its operation.
- An autonomic computing roadmap — If autonomic computing is the process of making computers behave like living, sentient creatures, then you, as a developer, are the doctor who makes sure your products and systems are performing properly. If there's an area of concern, you must diagnose it and make sure it has what it needs to function properly. This article gives you a roadmap to begin integrating autonomic computing concepts into your products.
- Design an application for grid — Designing an application for grid computing is much easier if you know what to expect. In this article, you will learn which design elements are suitable for a grid application and which are not. Armed with this information, you can then tailor existing applications and develop new ones for a grid by focusing on the jobs, the data, and the environment that the application will use.
- Using Web Services Security in WebSphere Application Server — This article describes how to leverage the Web Services Security specification to secure an existing Web service. It demonstrates how to use message-level security (MLS) provided by Web Services Security in IBM WebSphere Application Server V5.0.2 to sign the message using X.509-based Digital Signatures for integrity, and how to encrypt the message using XML Encryption for confidentiality. It also demonstrates how to use both these provisions in tandem with transport-level security (TLS) provided by SSL/HTTPS.
This article was originally published on LinuxDevices.com and has been donated to the open source community by QuinStreet Inc. Please visit LinuxToday.com for up-to-date news and articles about Linux and open source.