Tampilkan postingan dengan label Integration. Tampilkan semua postingan
Tampilkan postingan dengan label Integration. Tampilkan semua postingan

Selasa, 05 Juli 2011

Jenkins Continuous Integration Server: An Essential Software Development Tool

Continuous integration (CI) is a software engineering practice that aims to minimize software development time while applying rigorous quality control from the beginning and at every step of the process. If you’re ready to jump on the CI bandwagon, turn to Jenkins CI.


Continuous integration (CI) is a software engineering practice that aims to minimize software development time while applying rigorous quality control from the beginning and at every step of the process. If you’re ready to jump on the CI bandwagon, turn to Jenkins CI.


The need for faster and better software development methods is nothing new. What’s changed lately is the fact that it’s almost impossible to stay competitive if you don’t use the best new tools. Factors such as globalization, outsourcing, and crowdsourcing have increased the time pressure on software development teams, while adding to the likelihood that team members cannot meet regularly to debug and test their code.


View the original article here

Jumat, 24 Juni 2011

Debian Squeeze, Squid, Kerberos/LDAP Authentication, Active Directory Integration And Cyfin Reporter

This document covers setup of a Squid Proxy which will seamlessly integrate with Active Directory for authentication using Kerberos with LDAP as a backup for users not authenticated via Kerberos. Authorisation is managed by Groups in Active Directory. This...


This document covers setup of a Squid Proxy which will seamlessly integrate with Active Directory for authentication using Kerberos with LDAP as a backup for users not authenticated via Kerberos. Authorisation is managed by Groups in Active Directory. This is especially useful for Windows 7 clients which no longer support NTLMv2 without changing the local computer policy. It is capable of using white lists and black lists for site access and restrictions.


View the original article here