Technology behind Online Portal based on Travel and Tourism

I always had some excitement about travel and tourism industry. World are getting shrink day by day. Different culture and difference in languages is not any more border between two…

Read more »

How To scp, ssh and rsync without prompting for password using OpenSSH

Verify that local-host and remote-host is running openSSH ssh -V OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006 Lets say you want to copy between two hosts host_src and host_dest. host_src is…

Read more »

Perforce Central Authorization Server: P4AUTH

Perforce Central Authorization Server: P4AUTH Problem Statement: Prepare a report on Perforce Servers Automation which consists of following requirement. We need to develop a centralized web based tool which will…

Read more »

Apaceh HTACCESS Tutorial

Introduction What Can I Do? Creating A .htaccess File What is .htaccess Why Not to use .htaccess Error Documents | Custom Error Pages Blocking users by IP Blocking users/ sites…

Read more »

Difference between Maven 1 and Maven 2

What is Maven 2? Maven 2.0 is a complete rewrite of the ‘original’ Maven application (‘Maven 1’). As such, it is very different from Maven 1, and not backwards-compatible (eg,…

Read more »

How to Setup p4 in Linux / Unix

How to Setup p4 in Linux / Unix Well many people have these questions to me that they are facing issues setting up p4 client in Linux or Unix. The…

Read more »

Some additional LOC tools

USC CodeCount and USC COCOMO- $0 CodeCount automates the collection of source code sizing information. The CodeCount toolset utilizes one of two possible source lines of code (SLOC) definitions, physical or…

Read more »

Changed, Added and Deleted SLOC

An important consideration for Software Project Managers is whether the requirements are being altered in a given project without their knowledge or consent. The impact of unauthorized or unscheduled departure…

Read more »

Criteria to decide suitable CLOC tools for your source code

Hi, Please find to answer follwing questions in order to find out sutable CLOC tools for your project. What are the features of CLOC? Language Support Platform Support Two Baseline…

Read more »

Questionnaire: Access your SCM Process in Project

TABLE OF CONTENTS 1…… General Assessment Questions. 2 1.1     Questions to analyze the development process description.. 2 1.2     Questions to characterize the project application.. 2 1.3     Questions to identify the supporting tools. 2 2…… Assessment on Configuration and Change…

Read more »

Perforce Customization To Revert Changelist

Perforce Customization To Revert Changelist Attachech Python File: Download here Perforce Python script to revert Changelist Purpose In Perforce if we check in any change list and in case if we…

Read more »

Ways to Pass Password in Triggers file or Script file in Perforce

Option 1 If your Perforce server is set to security level 2 or lower you can have your trigger script run as the same user every time (typically a “background”…

Read more »

Perforce Command Line Global Options

<!– .style1 { font-size: 24px; font-weight: bold; } –> Perforce Command Line Global Options Global options for Perforce commands; these options can be supplied on the command line before any Perforce…

Read more »

Perforce Command Line

Command Description p4 add Open file(s) in a client workspace for addition to the depot. p4 admin Perform administrative operations on the server. p4 branch Create or edit a branch…

Read more »

Perforce Merging Process

Perforce Merging Process In Perforce when we have conflict in files, “?” notion comes with the files which says this need to be resolved. Once you select the file and…

Read more »

Basic Perforce Administration

A. User maintenance tasks 1. Resetting passwords 2. Creating users / Deleting users / Setting user access 3. Disabling the automatic creation of users 4. Cleaning up files left open…

Read more »

Recovery Procedures in Perforce Server

Recovery Procedures in Perforce Server If the database files become corrupted or lost, either because of disk errors, a hardware failure such as a disk crash, the database can be…

Read more »

How to Backup Perforce Server

How to Backup Perforce Server Regular backups of your Perforce data are vital. The key concepts are: Make sure journaling is active Create checkpoints regularly, and Use p4 verify regularly…

Read more »

Perforce Server Installation and Configuration

p4d – Perforce Server p4 – Perforce Client p4win – Perforce Windows Client Install P4 Server in Unix Copy p4d & p4 in /usr/local/bin Give permission such as chmod +x…

Read more »

Linux User Management

ac Print statistics about users’ connect time. accton Turn on accounting of processes. To turn it on type “accton /var/log/pacct”. adduser Ex: adduser mark – Effect: Adds a user to…

Read more »

Java Command Line Options

-client       to select the “client” VM -server       to select the “server” VM -hotspot      is a synonym for the “client” VM  [deprecated] The default VM is client. -cp <class search path…

Read more »

How to Resolve Windows Installer Problem

Installation of a program means inserting that particular program in your computer so that it can be executed properly. Some of the software programs can be simply copied to the…

Read more »

Writing a Custom Plugin for Maven

Introduction In this article, we will learn about Maven which is a project management framework that provides a configurable approach for managing software projects. Maven covers all the necessary phases that happen right from…

Read more »

Syncing missing/modified files to a specific version in Perforce

I think this is the 5th time I’ve had to figure this out in the past few years, so this time I’m going to preserve it here for posterity  The…

Read more »

Customizing the Firefox Installer on Windows

One of the questions I get asked a lot is how to customize the Firefox installer on Windows and how to bundle extensions with it. I’ve spent the past few…

Read more »

10 Key Suggestions To Build The Document Management System With Your Employees

Employees never feel at ease under a boss who doesn’t trust them or whom they don’t trust. In the absence of mutual trust productivity falls as the employees get into…

Read more »

Tools for Counting Lines of Code in Source Code

USC CodeCount and USC COCOMO- $0 CodeCount automates the collection of source code sizing information. The CodeCount toolset utilizes one of two possible source lines of code (SLOC) definitions, physical or…

Read more »

Sonar Support with JSP & HTML

JSP/HTML land, usefull tests could be done via some regexp, ie check if style/css are used (to avoid dirty colors/fonts hard-coded for example). If we want to build something pretty…

Read more »

What is HTTP (HyperText Transfer Protocol)

Short for HyperText Transfer Protocol, the underlying protocol  used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers  should…

Read more »

Berkeley Internet Name Domain(BIND)

Abbreviated as BIND, Berkeley Internet Name Domain  is the most common implementation of the DNS protocol on the Internet. It’s freely available under the BSD License. BIND DNS servers are believed to be…

Read more »