Space Details

Total Page:16

File Type:pdf, Size:1020Kb

Space Details Space Details Key: MULE2USER Name: Mule 2.x User Guide Description: Mule Users Guide for the 2.x release line Creator (Creation Date): ross (Jan 30, 2008) Last Modifier (Mod. Date): tcarlson (Apr 15, 2008) Available Pages • Configuring a Mule Instance • Escape URI Credentials • Home • 3.x Features • Using JSON • Configuring Encoding • Hot Deploying Mule Applications • Deploying Mule as a Service to Tomcat • Starting Mule with the Configuration • About Mule Configuration • About Configuration Builders • Configuring Properties • Mule High Availability • Storing Objects in the Registry • About Transports • Available Transports • BPM Transport • CXF Transport • Building a CXF Web Service • CXF Transport Configuration Reference • Enabling WS-Addressing • Enabling WS-Security • Supported Web Service Standards • Using a Web Service Client as an Outbound Endpoint • Using a Web Service Client Directly • Using HTTP GET Requests • Using MTOM • EJB Transport • Email Transport • File Transport • FTP Transport • HTTPS Transport • HTTP Transport • IMAPS Transport Document generated by Confluence on Feb 07, 2010 23:59 Page 1 • IMAP Transport • JDBC Transport • JDBC Transport Configuration Reference • JDBC Transport Examples • JDBC Transport Performance Benchmark Results • Jetty Transport • Jetty SSL Transport • JMS Transport • Tibco EMS Integration • JBoss Jms Integration • Fiorano Integration • OpenJms Integration • SwiftMQ Integration • Sun JMS Grid Integration • SonicMQ Integration • SeeBeyond JMS Server Integration • Open MQ Integration • ActiveMQ Integration • WebLogic JMS Integration • Mule MSMQ Transport • Mule WMQ Transport • Multicast Transport • POP3S Transport • POP3 Transport • Quartz Transport • RMI Transport • Servlet Transport • SMTPS Transport • SMTP Transport • SOAP Transport • SSL Transport • STDIO Transport • TCP Transport • UDP Transport • VM Transport • WSDL Connectors • XMPP Transport • Bootstrapping the Registry • Choosing the Right Topology • Configuration Overview • Configuration Reference • Asynchronous Reply Router Configuration Reference Document generated by Confluence on Feb 07, 2010 23:59 Page 2 • Catch-all Strategy Configuration Reference • Component Configuration Reference • Endpoint Configuration Reference • Exception Strategy Configuration Reference • Filters Configuration Reference • Global Settings Configuration Reference • Inbound Router Configuration Reference • Model Configuration Reference • Notifications Configuration Reference • Outbound Router Configuration Reference • Properties Configuration Reference • Security Manager Configuration Reference • Service Configuration Reference • Transactions Configuration Reference • Configuring Endpoints • Mule Endpoint URIs • Configuring a Transport • Configuring Retry Policies • Configuring Logging • Configuring Queues • Configuring Security • Component Authorization Using Acegi • Component Authorization Using Spring Security • Configuring the Acegi Security Manager • Configuring the Spring Security Manager • Encryption Strategies • SAML Module • Setting up LDAP Provider for Acegi • Setting up LDAP Provider for Spring Security • Upgrading from Acegi to Spring Security • Controlling the Infrastructure with the Service Registry • Creating a Custom XML Namespace • Creating Custom Routers • Creating Transports • Transport Archetype • Transport Service Descriptors • Deployment Scenarios • Deploying Mule to WebLogic • Deploying Mule to WebSphere • Embedding Mule in a Java Application or Webapp • JBoss Integration • Mule as MBean Document generated by Confluence on Feb 07, 2010 23:59 Page 3 • Developing Service Components • Entry Point Resolver Configuration Reference • Error Handling • Functional Testing • Installing a Standalone Mule Instance • Installing Upgrades and Hot Fixes • Internationalizing Strings • Introduction to Extending Mule • Introduction to Testing Mule • Models • Mule Agents • JMX Management • Mule Server Notifications • Profiling Mule • Resource Adapter • Suggested Reading • Third-party Software in Mule • Transaction Management • Tuning Performance • Unit Testing • Using Filters • Using IDEs • Using the Mule Management Console • Installing the Management Console with an External Database • Management Console Agent Settings • Using Mule Modules • Acegi Module • JAAS Module • JBoss Transaction Manager • Scripting Module • Spring Extras Module • SXC Module • XML Module • DomToXml Transformer • JXPath Extractor Transformer • XmlObject Transformers • XmlToXMLStreamReader Transformer • XPath Extractor Transformer • XSLT Transformer • Using Mule with Spring • Sending and Receiving Mule Events in Spring • Spring Application Contexts Document generated by Confluence on Feb 07, 2010 23:59 Page 4 • Using Spring Beans as Service Components • Using the Mule Client • Using the Mule RESTpack • Architecting RESTful HTTP applications • Making Sense of REST • Using Transformers • Creating Custom Transformers • Transformers Configuration Reference • XmlPrettyPrinter Transformer • Using Web Services • Axis • Axis SOAP Styles • Axis SOAP Transports • Axis Transport • Axis Web Services and Mule • Configuring Axis • Proxying Web Services • Using .NET Web Services with Mule • Web Service Wrapper • Working with Services • Configuring Components • Configuring Java Components • Using Interceptors • Configuring the Service • MEPs • Mule Messaging Styles • Using Message Routers • Inbound Routers • Outbound Routers • Asynchronous Reply Routers • Catch-all Strategies • Component Bindings • About the XML Configuration File • Example Archetype • Jaas Security • JavaRebel Integration • Module Archetype • PGP Security • Project Archetype • Streaming • Using Expressions • Creating Expression Evaluators • Expressions Configuration Reference Document generated by Confluence on Feb 07, 2010 23:59 Page 5 Configuring a Mule Instance This page last changed on Jun 30, 2009 by jwheeler. Configuring a Mule Instance A Mule configuration file can become an elaborate tree of elements, however, the basic things to configure at the top level are: • Connectors - Non-default configuration of any transports used • Endpoints - Global definition of endpoints is encouraged to clearly describe where your integration channels are • Transformers - Transformers may be defined globally and later referenced from your services • Filters - Filters may be defined globally and later referenced from your services • Models - One or more models that logically group together your services • Services - One or more services that wrap your components and configure routers, endpoints, transformers, and filters specifically for that service Following is an example of a simple Mule configuration file: <mule xmlns="http://www.mulesource.org/schema/mule/core/2.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:vm="http://www.mulesource.org/schema/mule/vm/2.2" xsi:schemaLocation=" http://www.mulesource.org/schema/mule/core/2.2 http://www.mulesource.org/schema/mule/core/2.2/ mule.xsd http://www.mulesource.org/schema/mule/vm/2.2 http://www.mulesource.org/schema/mule/vm/2.2/ mule-vm.xsd"> <vm:connector name="vmConnector" queueEvents="true" queueTimeout="5000"/> <vm:endpoint name="CustomerRequests" path="customer.requests"/> <vm:endpoint name="CustomerResponses" path="customer.responses"/> <custom-transformer name="ThisToThat" class="com.acme.transformer.ThisToThat"/> <model name="main"> <service name="myBasicService"> <inbound> <inbound-endpoint ref="CustomerRequests"/> </inbound> <component class="com.acme.service.BasicService"/> <outbound> <pass-through-router> <outbound-endpoint ref="CustomerResponses" transformer-refs="ThisToThat"/> </pass-through-router> </outbound> </service> Document generated by Confluence on Feb 07, 2010 23:59 Page 6 </model> </mule> Advanced Configuration Other, more advanced things you may configure at this level: • Agents - Agents are typically used for cross-cutting concerns such as logging or management • Notifications - Be notified upon certain lifecycle events • Security Manager - Authenticates requests based on one or more security providers • Transaction Management - Mule transactions are configured on inbound endpoints, where an endpoint can be configured to start a new transaction or join an existing one. • Global Configuration Options - Miscellaneous global settings • Global Properties - Placeholder values Document generated by Confluence on Feb 07, 2010 23:59 Page 7 Escape URI Credentials This page last changed on Nov 26, 2008 by jackie.wheeler. Escape Your Credentials If you use a URI-style endpoint and you include the user name and password, escape any characters that are illegal for URIs, such as the @ character. For example, if the user name is [email protected], you should enter it as user%40myco.com. Document generated by Confluence on Feb 07, 2010 23:59 Page 8 Home This page last changed on Dec 17, 2009 by jwheeler. Welcome to the documentation for Mule ESB. Some of the documentation on this site is under construction for the current release. If you have any feedback on the content, or would like to sign up to become a site contributor or editor, please contact us. 3.x snapshots are now available! For a list of features in progress for 3.x, click here. Getting Started Using Transports (Click the arrow to expand the topics from the • About Transports Getting Started guide, including an introduction • Available Transports to Mule, steps to get started, and migration • Configuring a Transport information.) Mule Deployment Click here to expand... Architecture • Introduction
Recommended publications
  • Opening Plenary State of the Feather
    Opening Plenary Lars Eilebrecht V.P., Conference Planning at ASF and Lead for ApacheCon Europe 2009 State of the Feather Jim Jagielski Chairman, The Apache Software Foundation Welcome to Amsterdam Presented by The Apache Software Foundation Produced by Stone Circle Productions, Inc. Conference Program • Detailed conference program guide available as a PDF from the ApacheCon Web site – www.eu.apachecon.com • Printed Conference-at-a- Glance program available at registration desk Presentations • 4 Tracks every day starting at 9:00 • Presentation slides provided by speakers will be made available on the ApacheCon Web site during the conference Wednesday Special Events • 9:15-9:30: Jim Jagielski “State of the Feather” • 9:30-10:30: Raghu Ramakrishnan “Data Management in the Cloud” • 10:30-11:30: Arjé Cahn, Ajay Anand, Steve Loughran, and Mark Brewer “Panel: The Business of Open Source”, moderated by Sally Khudairi • 13:00-14:00: Lars Eilebrecht “Behind the Scenes of The ASF” Wednesday Special Events • 18:30-20:00: Welcome Reception and ASF 10th Anniversary Party – Celebrating a Decade of Open Source Leadership • 19:30: OpenPGP Key Signing – [email protected] – moderated by Jean-Frederic Clere Thursday Special Events • 13:00-14:00: Jim Jagielski “Sponsoring the ASF at the Corporate and Individual Level” • 17:30-18:30: James Governor “Open Sourcing The Analyst Business – Turning Prop. Knowledge Inside Out” • 18:30-20:00: “Lightning Talks”, mod. by Danese Cooper and Rich Bowen Friday Special Events • 11:30-13:00: Lars Eilebrecht, Dirk- Willem van Gulik, Jim Jagielski, Sally Khudairi, Cliff Skolnick, “Apache Pioneer's Panel – 10 years of the ASF”, mod.
    [Show full text]
  • Site Map - Apache HTTP Server 2.0
    Site Map - Apache HTTP Server 2.0 Apache HTTP Server Version 2.0 Site Map ● Apache HTTP Server Version 2.0 Documentation ❍ Release Notes ■ Upgrading to 2.0 from 1.3 ■ New features with Apache 2.0 ❍ Using the Apache HTTP Server ■ Compiling and Installing Apache ■ Starting Apache ■ Stopping and Restarting the Server ■ Configuration Files ■ How Directory, Location and Files sections work ■ Server-Wide Configuration ■ Log Files ■ Mapping URLs to Filesystem Locations ■ Security Tips ■ Dynamic Shared Object (DSO) support ■ Content Negotiation ■ Custom error responses ■ Setting which addresses and ports Apache uses ■ Multi-Processing Modules (MPMs) ■ Environment Variables in Apache ■ Apache's Handler Use ■ Filters ■ suEXEC Support ■ Performance Hintes ■ URL Rewriting Guide ❍ Apache Virtual Host documentation ■ Name-based Virtual Hosts ■ IP-based Virtual Host Support ■ Dynamically configured mass virtual hosting ■ VirtualHost Examples ■ An In-Depth Discussion of Virtual Host Matching ■ File descriptor limitations ■ Issues Regarding DNS and Apache ❍ Apache Server Frequently Asked Questions http://httpd.apache.org/docs-2.0/sitemap.html (1 of 4) [5/03/2002 9:53:06 PM] Site Map - Apache HTTP Server 2.0 ■ Support ❍ Apache SSL/TLS Encryption ■ SSL/TLS Encryption: An Introduction ■ SSL/TLS Encryption: Compatibility ■ SSL/TLS Encryption: How-To ■ SSL/TLS Encryption: FAQ ■ SSL/TLS Encryption: Glossary ❍ Guides, Tutorials, and HowTos ■ Authentication ■ Apache Tutorial: Dynamic Content with CGI ■ Apache Tutorial: Introduction to Server Side Includes ■ Apache
    [Show full text]
  • Hitachi Command Suite V.8.7.1
    Hitachi Command Suite V. 8.7.1 Open Source Software Packages Contact Information: Hitachi Command Suite Project Manager Hitachi Vantara Corporation 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component ANTLR 2.7.2 ANTLR 2 License ANTLR 2.7.6 ANTLR 2 License Public Domain or Free License without AOP Alliance 1.0 conditions ASM 1.5.3 BSD 3-Clause "New" or "Revised" License ASM 3.3.1 BSD 3-Clause "New" or "Revised" License 3.3.1 ASM* BSD 3-Clause "New" or "Revised" License (modified) AngularJS 1.3.0 The MIT License Apache Axiom 1.2.13 Apache License, Version 2.0 Apache Axis2 1.6.2 Apache License, Version 2.0 Apache BSF 2.3.0 Apache Jakarta BSF License Apache Commons BCEL 5.1 Apache BCEL License Apache Commons CLI 1.1 Apache License, Version 2.0 Name of Product/Product Version License Component Apache Commons Codec 1.11 Apache License, Version 2.0 Apache Commons Codec 1.3 Apache License, Version 2.0 Apache Commons Collections 2.1 Apache Jakarta Commons License Apache Commons Collections 3.2.2 Apache License, Version 2.0 Apache Commons Digester 1.5 Apache Jakarta Commons License Apache Commons Digester 1.8 Apache License, Version 2.0 Apache Commons XMLSchema 1.4.7 Apache License, Version 2.0 Apache FOP 1.0 Apache License, Version 2.0 Apache License, Version 2.0 ISC License PCRE LICENCE (PCRE 4.5 and earlier) The License by "Bell Communications 2.0.59 Apache HTTP Server* Research, Inc.
    [Show full text]
  • Hitachi Command Suite V. 8.7.4 Open Source Software Packages
    Hitachi Command Suite V. 8.7.4 Open Source Software Packages Contact Information: Hitachi Command Suite Project Manager Hitachi Vantara, LLC 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component ANTLR 2.7.2 ANTLR 2 License ANTLR 2.7.6 ANTLR 2 License Public Domain or Free License without AOP Alliance 1.0 conditions ASM 1.5.3 BSD 3-Clause "New" or "Revised" License ASM 3.3.1 BSD 3-Clause "New" or "Revised" License 3.3.1 ASM* BSD 3-Clause "New" or "Revised" License (modified) AngularJS 1.3.0 The MIT License Apache Axiom 1.2.13 Apache License, Version 2.0 Apache Axis2 1.6.2 Apache License, Version 2.0 Apache BSF 2.3.0 Apache Jakarta BSF License Apache Commons BCEL 5.1 Apache BCEL License Apache Commons CLI 1.1 Apache License, Version 2.0 Name of Product/Product Version License Component Apache Commons Codec 1.11 Apache License, Version 2.0 Apache Commons Codec 1.3 Apache License, Version 2.0 Apache Commons Collections 2.1 Apache Jakarta Commons License Apache Commons Collections 3.2.2 Apache License, Version 2.0 Apache Commons Digester 1.5 Apache Jakarta Commons License Apache Commons Digester 1.8 Apache License, Version 2.0 Apache Commons XMLSchema 1.4.7 Apache License, Version 2.0 Apache FOP 1.0 Apache License, Version 2.0 Apache License, Version 2.0 ISC License PCRE LICENCE (PCRE 4.5 and earlier) The License by "Bell Communications 2.0.59 Apache HTTP Server* Research, Inc.
    [Show full text]
  • Open Source Used in Call Analyzer 1.2
    Open Source Used In call analyzer 1.2 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-145264460 Open Source Used In call analyzer 1.2 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-145264460 Contents 1.1 aiohttp 2.3.8 1.1.1 Available under license 1.2 aiohttp 1.3.1 1.2.1 Available under license 1.3 ANTLR 2.7.6 1.3.1 Available under license 1.4 asn1crypto 0.22.0 1.4.1 Available under license 1.5 asn1crypto 0.24.0 1.5.1 Available under license 1.6 bandit 1.4.0 1.6.1 Available under license 1.7 BCEL 5.1 1.7.1 Notifications 1.7.2 Available under license 1.8 BSF (Bean Scripting Framework) 2.4.0 1.8.1 Available under license 1.9 cffi 1.11.4 1.9.1 Available under license 1.10 CGLIB (Code Generation Library) 2.1.3 1.10.1 Available under license 1.11 confluent-kafka 0.10.2.1 1.11.1 Available under license 1.12 cryptography 2.2.2 1.12.1 Available under license 1.13 cryptography 2.2.2 Open Source Used In call analyzer 1.2 2 1.13.1 Available under
    [Show full text]
  • HIERARCHY in MERITOCRACY – Community Building and Code Production in the Apache Software Foundation
    HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation Master's Thesis Oscar Casta~neda HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation THESIS submitted in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE in MANAGEMENT OF TECHNOLOGY by Oscar Casta~neda born in Guatemala City, Guatemala Policy, Organization, Law and Gaming (POLG) Faculty Technology Policy and Management (TPM) Delft University of Technology (TU Delft) Delft, the Netherlands tbm.tudelft.nl c 2010 Oscar Casta~neda. HIERARCHY IN MERITOCRACY { Community Building and Code Production in The Apache Software Foundation Author: Oscar Casta~neda Student id: 1398946 Email: [email protected] Graduation Date: December 2010 Graduation Section: Policy, Organization, Law and Gaming (POLG) Abstract This research is about code production in top-level open source com- munities of The Apache Software Foundation (ASF). We extensively an- alyzed Subversion repository logs from 70 top-level Apache open source projects in the ASF from 2004 to 2009. Based on interactions in code production during one-year periods we constructed networks of file co- authorship that gave us access to the organization of Apache open source communities. This allowed us to measure graph level properties, like hier- archy and clustering, and their influence on the outputs of code production. Apache communities are groups of individuals that organize their code production efforts in order to develop enterprise-grade open source soft- ware. The ASF explains the success of its communities and the software they produce by claiming to have instituted a meritocracy that brings contributors together in a way that significantly influences code produc- tion, namely by building communities instead of only focusing on technical properties of the source code like modularity.
    [Show full text]
  • Storagetek Tape Analytics Licensing Information User Manual, Release 2.1 E59803-02 Copyright © 2015, Oracle And/Or Its Affiliates
    1[StorageTek] Tape Analytics Licensing Information User Manual Release 2.1 E59803-02 June 2015 StorageTek Tape Analytics Licensing Information User Manual, Release 2.1 E59803-02 Copyright © 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Rester En Sécurité !
    Full Circle LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX NUMÉRO 67 - Novembre 2012 Photo : Infidelic (Flickr.com) CRITIQUE LITTÉRAIRE : Think like a programmer RREESSTTEERR EENN SSÉÉCCUURRIITTÉÉ !! CRÉER UN ORDINATEUR À L'ÉPREUVE DES VOLEURS full circle magazine n° 67 1 sommaire ^ Full Circle Magazine n'est affilié en aucune manière à Canonical Ltd. Tutoriels Full Circle Opinions LE MAGAZINE INDÉPENDANT DE LA COMMUNAUTÉ UBUNTU LINUX Programmer en Python p.08 Rubriques Mon histoire p.44 LibreOffice - Partie 20 p.09 Command & Conquer p.06 Actus Ubuntu p.04 Qu'est-ce... p.47 DE RETOUR LE MOIS PROCHAIN Créer un ordinateur à l'épreuve Demandezaupetitnouveau p.35 Critique p.55 des voleurs p.12 Jeux Ubuntu p.XX Courriers p.60 Kdenlive - Partie 4 p.26 Labo Linux p.39 Q&R p.62 DE RETOUR LE MOIS PROCHAIN Inkscape - Partie 7 p.28 Femmes d'Ubuntu p.XX Fermeturedesfenêtres p.41 Développement Web p.31 Graphismes Dév. Web Les articles contenus dans ce magazine sont publiés sous la licence Creative Commons Attribution-Share Alike 3.0 Unported license. Cela signifie que vous pouvez adapter, copier, distribuer et transmettre les articles mais uniquement sous les conditions suivantes : vous devez citer le nom de l'auteur d'une certaine manière (au moins un nom, une adresse e-mail ou une URL) et le nom du magazine (« Full Circle Magazine ») ainsi que l'URL www.fullcirclemagazine.org (sans pour autant suggérer qu'ils approuvent votre utilisation de l'œuvre). Si vous modifiez, transformez ou adaptez cette création, vous devez distribuer la création qui en résulte sous la même licence ou une similaire.
    [Show full text]
  • Licensing Information 12.2 E65212-14 October 2020
    Oracle® Key Vault Licensing Information 12.2 E65212-14 October 2020 Licensing Information This document covers licensing information for Oracle Key Vault. • How Oracle Key Vault Is Licensed (page 1) • Restricted-Use Licensing (page 1) • About the Third-Party Licenses (page 2) • Third-Party Licensing (page 3) The third-party licensing information applies to Oracle Key Vault. • Documentation Accessibility (page 93) How Oracle Key Vault Is Licensed Oracle Key Vault is comprised of the following components: • Oracle Key Vault server • Oracle Key vault okvutil command-line utility • Oracle Key Vault PKCS#11 library • Oracle Key Vault management console The licensing is based on a per Oracle Key Vault server installation without per processor cost. There are no license restrictions on the number of endpoints connecting to the Oracle Key Vault server. This license includes restricted use licensing for the entire Oracle Key Vault stack. You should deploy a pair of Oracle Key Vault servers as primary and standby servers for high availability or network topology purposes. Restricted-Use Licensing Oracle Key Vault is a full-stack software appliance containing the following embedded components: Oracle Linux, Oracle Database, and Oracle GoldenGate. These components are subject to the following restricted use licenses: • Oracle Linux is licensed solely for use by Oracle Key Vault and may not be used or deployed for other purposes. 1 • Oracle Database is licensed for Oracle Database Enterprise Edition, plus the following Oracle Database options: Oracle Advanced Security, Oracle Advanced Compression, and Oracle Database Vault. The database and additional options are licensed solely for use by Oracle Key Vault and may not be used or deployed for other purposes.
    [Show full text]
  • Chapter 2. Configuring Apache: the First Steps Section 2.1
    Copyright Preface Who Wrote Apache, and Why? The Demonstration Code Conventions Used in This Book Organization of This Book Acknowledgments Chapter 1. Getting Started Section 1.1. What Does a Web Server Do? Section 1.2. How Apache Works Section 1.3. Apache and Networking Section 1.4. How HTTP Clients Work Section 1.5. What Happens at the Server End? Section 1.6. Planning the Apache Installation Section 1.7. Windows? Section 1.8. Which Apache? Section 1.9. Installing Apache Section 1.10. Building Apache 1.3.X Under Unix Section 1.11. New Features in Apache v2 Section 1.12. Making and Installing Apache v2 Under Unix Section 1.13. Apache Under Windows Chapter 2. Configuring Apache: The First Steps Section 2.1. What's Behind an Apache Web Site? Section 2.2. site.toddle Section 2.3. Setting Up a Unix Server Section 2.4. Setting Up a Win32 Server Section 2.5. Directives Section 2.6. Shared Objects Chapter 3. Toward a Real Web Site Section 3.1. More and Better Web Sites: site.simple Section 3.2. Butterthlies, Inc., Gets Going Section 3.3. Block Directives Section 3.4. Other Directives Section 3.5. HTTP Response Headers Section 3.6. Restarts Section 3.7. .htaccess Section 3.8. CERN Metafiles Section 3.9. Expirations Chapter 4. Virtual Hosts Section 4.1. Two Sites and Apache Section 4.2. Virtual Hosts Section 4.3. Two Copies of Apache Section 4.4. Dynamically Configured Virtual Hosting Chapter 5. Authentication Section 5.1. Authentication Protocol Section 5.2.
    [Show full text]
  • Bizhubpressc7000series C80
    1 Trademarks and Copyrights 1.1 Trademarks and Copyrights 1 1 Trademarks and Copyrights 1.1 Trademarks and Copyrights KONICA MINOLTA, the KONICA MINOLTA logo, symbol mark, and Giving Shape to Ideas are registered trademarks or trademarks of KONICA MINOLTA, INC. PageScope, bizhub, bizhub PRESS and bizhub PRO are registered trademarks or trademarks of KONICA MI- NOLTA, INC. Mozilla and Firefox are registered trademarks or trademarks of the Mozilla Foundation in the United States and other countries. Novell and NetWare are registered trademarks or trademarks of Novell, Inc. in the United States and other countries. Microsoft, Windows, Windows Server, Windows Vista, Windows 7 and Windows 8 are either registered trade- marks or trademarks of Microsoft Corporation in the United States and/or other countries. PowerPC is a registered trademark or trademark of International Business Machines Corporation in the Unit- ed States, other countries, or both. Apple, AppleTalk, Bonjour, TrueType, Macintosh, Mac OS and Safari are registered trademarks or trade- marks of Apple, Inc. CUPS and CUPS logo are trademarks of Apple Inc. Adobe, the Adobe logo, Acrobat, PostScript, Flash, and Flash Player are registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Adobe PostScript is protected by patents in the United States and other countries. InDesign and PageMaker are registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Copyright (C) 2010 KONICA MINOLTA, INC. Copyright © 2010 Adobe Systems Incorporated. All rights reserved. Patents Pending. ® ® This product contains Adobe Flash Player under license from Adobe Systems Incorporated. Copyright © 1995-2007 Adobe Macromedia Software LLC.
    [Show full text]
  • Whole Site Reworked
    HARCToolbox Table of contents 1 Home.............................................................................................................................8 1.1 Welcome to the HARCToolbox project!................................................................ 8 1.1.1 History................................................................................................................9 1.1.2 Overview..........................................................................................................10 1.1.3 Content.............................................................................................................11 1.1.4 Other links........................................................................................................12 1.2 NEWS!!................................................................................................................. 12 1.2.1 Latest news!..................................................................................................... 12 1.2.2 History..............................................................................................................12 1.3 Interaction with other projects.............................................................................. 13 1.3.1 Revision history............................................................................................... 13 1.3.2 Introduction...................................................................................................... 13 1.3.3 LIRC: Linux Infrared Remote Control...........................................................
    [Show full text]