
Developer
DeveloperManage DNS suffix configuration through Group Policy
Configuration issues are frequently identified to DNS settings. Rick Vanover shows how to centrally manage DNS suffix configuration with Group Policy.
You're on page 80, See the latest articles on Developer.
Configuration issues are frequently identified to DNS settings. Rick Vanover shows how to centrally manage DNS suffix configuration with Group Policy.
The DNS CNAME is one of the most versatile tools in an IT administrator’s arsenal. One caveat to reaching the full potential of a CNAME is default TTL. IT pro Rick Vanover explains situations to lower the default TTL.
Vincent Danen explains how to get more out of the search history features in the zsh shell.
Some users may make unrealistic demands, but most of the time, they just want software that's easy to use and that works the way it's supposed to. Justin James itemizes several basic user expectations and ways to address them.
JDK 5.0 and JDK 6.0 include the Java Monitoring & Management Console tool, also known as JConsole. Read about JConsole's usage options, and find out how JConsole changed from JDK 5 to JDK 6.
Without DNS, computers would have a very tough time communicating with each other. However, most Windows administrators still rely on WINS for name resolution on local area networks and some have little or no experience with DNS. Steven Warren explains how to install, configure, and troubleshoot a Windows Server 2008 DNS server.
Disagreements at work come with the territory -- but they aren't necessarily a bad thing. Handled properly, disagreements often can lead to productive gains and unexpected solutions. Calvin Sun offers some tips to help you make sure your disagreements stay under control.
If you ever need to sort character strings stored in SQL Server fields, check out this demonstration of how to write a common sorting algorithm using SQL Server TSQL code.
This tutorial provides an overview of the FPDF functionality and two examples using the PHP object-oriented approach to get you started with building your own PDFs.
Haskell uses a lazy evaluation system which allows you define as many terms as you like, safe in the knowledge that the compiler will only allocate the ones you use in an expression. In this article we use simple sequences as lists of infinite length in a number of different ways to demonstrate how you can use this approach.
According to James Gosling, often called the father of Java, the Java Micro Edition (ME) will gradually supplanted by the Java Standard Edition (SE). He said, "We’re trying to converge everything to the Java SE specification. Cell phones and TV set-top boxes are growing up."
Here's a collection of recent security vulnerabilities and alerts, which include cross-platform flaws discovered in the Java Runtime Environment, vulnerabilities discovered in Thunderbird in Ubuntu, and a local buffer overflow in IBM AIX.
Find out what Justin James really dislikes about programming, and then share your ideas about what direction the programming paradigm should take in the future.
Following up from last week's article on reading zip archives, we show you how you can create your own archives using Python.
A "highly critical" vulnerability has been reported in the popular TikiWiki software. It can be exploited by malicious parties to compromise vulnerable systems.