WS application configuration - best practice advice

Hi there,
I'm a newbie on web services.
I'm currently developing a Web Service using JAX-WS 2.1 and deploying on Tomcat 6.
I'm wondering where to put my application's configuration. If I was developing a standalone java application I would put it in a Java Properties file or perhaps use the Java Preferences API.
But this is not a standalone java application, it is something that runs in a container, in this case Tomcat.
I have a fealing that web.xml is the intended place to put this information but I've also read posts discouraging this. I'm also in the dark as to how to access the information in web.xml (Context parameters section) from within my web service.
Basically I would like to use a solution which is a much standard as possible, i.e. not tied to any specific container.
Thanks.
Changed typo: "have" changed to "how"

What is the model number of the switch?
Normally a switch that cannot be changed does not have an IP address.  So if your switch has an address (you said it was 192.168.2.12)  I would assume that it can be changed and that it must support either a gui or have some way to set or reset the switch.
Since Router1 is using the 192.168.1.x  subnet , then the switch would need to have a 192.168.1.x  address (assuming that it even has an IP address), otherwise Router1 will not be able to access the switch.
I would suggest that initially, you setup your two routers without the switch, and make sure they are working properly, then add the switch.  Normally you should not need to change any settings in your routers when you add the switch.
To setup your two routers, see my post at this URL:
http://forums.linksys.com/linksys/board/message?board.id=Wireless_Routers&message.id=108928
Message Edited by toomanydonuts on 04-07-2009 02:39 AM

Similar Messages

  • RAID Level Configuration Best Practices

    Hi Guys ,
       We are building new Virtual environment for SQL Server and have to define RAID level configuration for SQL Server setup.
    Please share your thoughts for RAID configuration for SQL data, log , temppdb, Backup files .
    Files  RAID Level 
    SQL Data File -->
    SQL Log Files-->
    Tempdb Data-->
    Tempdb log-->
    Backup files--> .
    Any other configuration best practices   are more then welcome . 
    Like Memory Setting at OS level , LUN Settings. 
    Best practices to configure SQL Server in Hyper-V with clustering.
    Thank you
    Please Mark As Answer if it is helpful. \\Aim To Inspire Rather to Teach A.Shah

    Hi,
    If you can shed some bucks you should go for RAID 10 for all files. Also as a best practice keeping database log and data files on different physical drive would give optimum performance. Tempdb can be placed with data file or on a different drive as per
    usage. Its always good to use dedicated drive for tempdb
    For memory setting.Please refer
    This link for setting max server memory
    You should monitor SQL server memory usage using below counters taken from
    this Link
    SQLServer:Buffer Manager--Buffer Cache hit ratio(BCHR): IIf your BCHR is high 90 to 100 Then it points to fact that You don't have memory pressure. Keep in mind that suppose somebody runs a query which request large amount of pages in that
    case momentarily BCHR might come down to 60 or 70 may be less but that does not means it is a memory pressure it means your query requires large memory and will take it. After that query completes you will see BCHR risiing again
    SQLServer:Buffer Manager--Page Life Expectancy(PLE): PLE shows for how long page remain in buffer pool. The longer it stays the better it is. Its common misconception to take 300 as a baseline for PLE.   But it is not,I read it from
    Jonathan Kehayias book( troubleshooting SQL Server) that this value was baseline when SQL Server was of 2000 version and max RAM one could see was from 4-6 G. Now with 200G or RAM coming into picture this value is not correct. He also gave the formula( tentative)
    how to calculate it. Take the base counter value of 300 presented by most resources, and then determine a multiple of this value based on the configured buffer cache size, which is the 'max server memory' sp_ configure option in SQL Server, divided by 4 GB.
      So, for a server with 32 GB allocated to the buffer pool, the PLE value should be at least (32/4)*300 = 2400. So far this has done good to me so I would recommend you to use it.  
    SQLServer:Buffer Manager--CheckpointPages/sec: Checkpoint pages /sec counter is important to know about memory pressure because if buffer cache is low then lots of new pages needs to be brought into and flushed out from buffer pool, 
    due to load checkpoint's work will increase and will start flushing out dirty pages very frequently. If this counter is high then your SQL Server buffer pool is not able to cope up with requests coming and we need to increase it by increasing buffer pool memory
    or by increasing physical RAM and then making adequate changes in Buffer pool size. Technically this value should be low if you are looking at line graph in perfmon this value should always touch base for stable system.  
    SQLServer:Buffer Manager--Freepages: This value should not be less you always want to see high value for it.  
    SQLServer:Memory Manager--Memory Grants Pending: If you see memory grants pending in buffer pool your server is facing SQL Server memory crunch and increasing memory would be a good idea. For memory grants please read this article:
    http://blogs.msdn.com/b/sqlqueryprocessing/archive/2010/02/16/understanding-sql-server-memory-grant.aspx
    SQLServer:memory Manager--Target Server Memory: This is amount of memory SQL Server is trying to acquire.
    SQLServer:memory Manager--Total Server memory This is current memory SQL Server has acquired.
    For other settings I would like you to discuss with vendor. Storage questions IMO should be directed to Vendor.
    Below would surely be a good read
    SAN storage best practice For SQL Server
    SQLCAT best practice for SQL Server storage
    Please mark this reply as answer if it solved your issue or vote as helpful if it helped so that other forum members can benefit from it.
    My TechNet Wiki Articles

  • Swtich with 2 wireless routers (configuration for best practice/advice?)

    HI folks,
    I have a gigabit switch, and 2 wireless G routers.  I'll leave the model numbers out as it's fairly irrelevant - all linksys.
    Router 1 is used as a router only (due to location in basement)
    Router 2 is used for wireless only
    My current network setup:
    DSL MODEM (accessed on 192.168.2.1 - can not be changed) > Router 1(192.168.1.1)
    Router 1 > Switch (i believe it can't be changed 192.168.2.12 - no webgui)
    Switch > everything else including Router 2
    Everything works except Router 2 - can't connect to it wired or wirelessly until connected directly to a pc.
    Is my setup wrong
    and/or is there a best practice?
    Many thanks!!!

    What is the model number of the switch?
    Normally a switch that cannot be changed does not have an IP address.  So if your switch has an address (you said it was 192.168.2.12)  I would assume that it can be changed and that it must support either a gui or have some way to set or reset the switch.
    Since Router1 is using the 192.168.1.x  subnet , then the switch would need to have a 192.168.1.x  address (assuming that it even has an IP address), otherwise Router1 will not be able to access the switch.
    I would suggest that initially, you setup your two routers without the switch, and make sure they are working properly, then add the switch.  Normally you should not need to change any settings in your routers when you add the switch.
    To setup your two routers, see my post at this URL:
    http://forums.linksys.com/linksys/board/message?board.id=Wireless_Routers&message.id=108928
    Message Edited by toomanydonuts on 04-07-2009 02:39 AM

  • IP over Infiniband network configuration best practices

    Hi EEC Team,
    A question I've been asked a few times, do we have any best practices or ideas on how best to implement the IPoIB network?
    Should it be Class B or C?
    Also, what are your thoughts in regards to the netmask, if we use /24 it doesn't give us the ability to visually separate two different racks (ie Exalogic / Exadata), whereas netmask /23, we can do something like:
    Exalogic : 192.168.*10*.0
    Exadata : 192.168.*11*.0
    While still being on the same subnet.
    Your thoughts?
    Gavin

    I think it depends on a couple of factors, such as the following:
    a) How many racks will be connected together on the same IPoIB fabric
    b) What rack configuration do you have today, and do you foresee any expansion in the future - it is possible that you will move from a purely physical environment to a virtual environment, and you should consider the number of virtual hosts and their IP requirements when choosing a subnet mask.
    Class C (/24) with 256 IP values is a good start. However, you may want to choose a mask of length 23 or even 22 to ensure that you have enough IPs for running the required number of WLS, OHS, Coherence Server instances on two or more compute nodes assigned to a department for running its application.
    In general, when setting a net mask, it is always important that you consider such growth projections and possibilities.
    By the way, in my view, Exalogic and Exadata need not be in the same IP subnet, especially if you want to separate application traffic from database traffic. Of course, they can be separated by VLANs too.
    Hope this helps.
    Thanks
    Guru

  • Internet Sales application 2007 - Best Practice

    Hi Gurus
    Has anyone completed a successful CRM 2007 Internet Sales (ISA not ICSS) configuration exercise.
    If anyone has completed the set-up please could you inform me of the documents you referenced in order to achieve this.
    Many Thanks
    Babu.

    SAP has confirmed to me that there is NOT a CRM6/7 ISA Best Practices guide.
    We used the C14_BB_ConfigGuide from our CRM4 Best Practices install and made some assumptions on what had changed.  I do not think this is still available here and am not sure if I am able to send it to anyone.  Someone from SAP or an Admin can tell us.
    I also found here the following docs that have bits and pieces of the puzzle.
    ECO_Authorizations.CRM5.0  - I think I found this on Sateesh's site, but probably a link around here for it. - CRM E-Commerce Authorizations
    Release 5.0
    SAP_ISA60_DevAndExt  - SAP E-Commerce
    6.0 u2013 Landscape, Basics and Concepts.
    Web AS  - Web Application Development
    Title: Working with Java Server Pages and Servlets
    Benny Schaich

  • SubFlow best practice advice please

    I am new to IPCCX scripting and would like some advice on whether multiple SubFlows are a good idea.
    We have 16 small Call Centers that all have very basic scripts. I plan on adding a Holiday/Emergency Closure SubFlow to all of them and I would like to add a few additional features as well.
    I plan on adding:
    ·         Position in Queue
    ·         Expected Wait Time
    ·         If more than X number of callers in queue, inform the caller that they cannot be helped at this time and to call back later.
    ·         If Expected Wait Time exceeds closing time, inform the caller that they cannot be helped at this time and to call back later.
    (I know the last two sound pretty harsh, but it’s government, and there is no budget to hire more operators. I think it is better to let the callers know early that they need to call back, than to have them wait for two hours just to be disconnected. And no, this is NOT the 911 call center!!!   LOL)
    My questions are:
    Would it be ok to add each feature as a SubFlow? Or could there possibly be performance or other issues by having so many SubFlows in one script.
    My other option is to add each item internal to each script, but that would be a lot to tackle 16 times…
    Lastly, is there a best practice on how short a script should be for performance? I know you can’t have one that is longer than 1000 steps, but should I try to keep the step count below a certain number?
    Any advice or insights would be greatly appreciated…
    Thanks,
    Doug.

    Doug,
    Most of the items your list are included natively in UCCX.  Use the Get Reporting Statistic step to obtain the expected wait time, position in queue, and total queue time information. The current time-of-day can be had using a Time variable.  You'll need to do some work to convert the values into something you can play to the calling party as a prompt, a subflow is great for that, but you shouldn't need to reinvent the wheel.
    Take the time to draw out the call flow for each of the 16 contact centers on paper or in MS Visio. If your 16 call flows are very similar in the way they operate, consider a master script that just changes the prompts/menus based on the number dialed.  Leverage XML or a database (if you have premium licensing) to pull in the relevant information you need for each DNIS.  You may find you can streamline the entire system, or at least a good portion of it, without it becoming 16 unwieldy applications.
    Steven

  • Best Practice Advice - Using ARD for Inventorying System Resources Info

    Hello All,
    I hope this is the place I can post a question like this. If not please direct me if there is another location for a topic of this nature.
    We are in the process of utilizing ARD reporting for all the Macs in our district (3500 +/- a few here and there). I am looking for advice and would like some best practices ideas for a project like this. ANY and ALL advice is welcome. Scheduling reports, utilizing a task server as opposed to the Admin workstation, etc. I figured I could always learn from those with experience rather than trying to reinvent the wheel. Thanks for your time.

    hey, i am also intrested in any tips. we are gearing up to use ARD for all of our macs current and future.
    i am having a hard time with entering the user/pass for each machine, is there and eaiser way to do so? we dont have nearly as many macs running as you do but its still a pain to do each one over and over. any hints? or am i doing it wrong?
    thanks
    -wilt

  • JEE5 Application Architecture Best Practice.

    Hi Everybody
    I am going to redesign a moderate size application (not v big but larger then normal).
    Now I have few Question in my mind.
    I am using JSF as front-end, EJB3 Session Bean for Business Logic and last but not the least JPA as domain model.
    1 - With JPA we have a domain classes. Now its better to use entity as manage-bean for JSF or manage bean should be saperate.
    2 - Using DTO (Data Transfer Object) is good practice or not in JEE5.
    3 - Simplicity or Complexity but with EntityManager I feel no need of DAO but I am used to with DAO pattern. So again as best practice I have to make 1 session bean as DAO and call it from all the session bean where I write business logic or forget about DAO session bean and call EntityManager from all session bean everywhere.
    4 - For initializing EJB JNDI is 1 way other way is
    @EJB EJBCLASSNAME ejbclassobject; //this auto initialize and create object.
    Initializing like above is standard or it is an extended support from some app server.

    Hi,
    Follow my opinion:
    1 - With JPA we have a domain classes. Now its better to use entity as manage-bean for JSF or manage bean should be saparated.
    >> I think that Managed-Bean must be separated, because you can need to bind you Visual Components to it too.
    2 - Using DTO (Data Transfer Object) is good practice or not in JEE5.
    >> You can put your Entity as a member of you Managed Bean.
    3 - Simplicity or Complexity but with EntityManager I feel no need of DAO but I am used to with DAO pattern. So again as best practice I have to make 1 session bean as DAO and call it from all the session bean where I write business logic or forget about DAO session bean and call EntityManager from all session bean everywhere.
    >> For CRUD operation I don't create a additional class, but for complex business logic, you can use a separated class (Business Manager)
    Best regards

  • DNS Configured-Best Practice on Snow Leopard Server?

    How many of you configure and run DNS on your Snow Leopard server as a best practice, even if that server is not the primary DNS server on the network, and you are not using Open Directory? Is configuring DNS a best practice if your server has a FQDN name? Does it run better?
    I had an Apple engineer once tell me (this is back in the Tiger Server days) that the servers just run better when DNS is configured correctly, even if all you are doing is file sharing. Is there some truth to that?
    I'd like to hear from you either way, whether you're an advocate for configuring DNS in such an environment, or if you're not.
    Thanks.

    Ok, local DNS services (unicast DNS) are typically straightforward to set up, very useful to have, and can be necessary for various modern network services, so I'm unsure why this is even particularly an open question.  Which leads me to wonder what other factors might be under consideration here; of what I'm missing.
    The Bonjour mDNS stuff is certainly very nice, too.  But not everything around supports Bonjour, unfortunately.
    As for being authoritative, the self-hosted out-of-the-box DNS server is authoritative for its own zone.  That's how DNS works for this stuff.
    And as for querying other DNS servers from that local DNS server (or, if you decide to reconfigure it and deploy and start using DNS services on your LAN), then that's how DNS servers work.
    And yes, the caching of DNS responses both within the DNS clients and within the local DNS server is typical.  This also means that there is need no references to ISP or other DNS servers on your LAN for frequent translations; no other caching servers and no other forwarding servers are required.

  • Web application security best practice?

    Hi guys,
    I am developing web app using JSF + Spring + Hibernate. I got a user backing bean which handling user login and logout session. Hence if user sign-in successfully, I will just set userLogIn=true in the userBean.java. I really don;t know if this is the best practice for handling user login session. Any security probelm here? Please advice, Thanks !
    regards,
    kmthien

    hi
    you can also find a lot of info about security handling and JSF if you search the forum.
    thanks.

  • Server 2008 R2 RDS HA Licensing configuration best practices

    Hello
    What is the best practice for setting up and HA licensing environment for RDS?  I'm using a mixture of RDS CALs for my internal/AD users and External Connector license for my external/Internet users. 
    Daddio

    Hi,
    To ensure high availability you want to have a fallback License Server in your environment. The recommended method to configure Terminal Service
    Licensing servers for high availability is to install at least two Terminal Services Licensing servers in Enterprise Mode with available Terminal Services CALs. Each server will then advertise in Active Directory as enterprise license servers with regard to
    the following Lightweight Directory Access Protocol (LDAP) path: //CN=TS-Enterprise-License-Server,CN=site name,CN=sites,CN=configuration-container.
    To get more details on how to setup your License Server environment for redundancy and fallback, go over the "Configuring License Servers for High Availability"
    section in the Windows Server 2003 Terminal Server Licensing whitepaper
    Regards,
    Dollar Wang
    Forum Support
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support,
    contact [email protected]
    Technology changes life……

  • SRST Configuration - Best Practices

    We are starting a new Unified Communication deployment and will have an SRST at each remote location. I am wondering if there are any best practices in regards to the configuration of the SRST.
    For example Does it matter what interface is specific for the source address. I have seen some that say it needs to be the LAN address and others say it needs to be a Loopback address. Since the phones themselves will be attached to a VLAN on a switch that is connected to the router is there a benefit either way? Are there any considerations not really covered in the base configuration that need to be considered as a best practice?
    I am sure I will have more questions as we progress so thanks for the patience in advance...
    Brent                    

    Hi Brent,
    The loopback is used because it is an interface that remains up regardless of the physical layer, so provided that appropriate routing is in place, the lo address will be reachable through the physical interfaces.
    Best practices on the top of my mind should include looking at the release notes for the software version you're using, check network requirements and compatibility matrix, interworking, caveats, and reserve time for testing.
    I'm sure you'll be just fine
    hth

  • Rules Best Practice Advice Required

    I find that I'm fighting with the Business Rules in my BPM project, so I'd thought I throw the scenario out here and see what best practices anyone might propose.
    The Example*:
    Assume I have people, and each of them is assigned a list/array of "aspects" from an enumerated set: TALL; SPORTY; TALKATIVE; TRAVELER; STUDIOUS; GREGARIOUS; CLAUSTROPHOBIC.
    Also assume I have several Marketing campaigns, and as part of one or more processes, I need to occasionally determine whether a person fits the criteria for a particular campaign, which is based on the presence of a one or more aspects. The definitions of the campaigns may change, so the thought is to define them as business rules; if they change, the rule changes, without impacting the processes themselves (assume the set of campaigns doesn't change, just the rules for matching aspects to a particular campaign).
    My initial take is to to define each campaign as a bucketset, containing aspects, the presence of which indicates inclusion in the campaign. If a person has ANY of the aspects, they are considered a member.
    Campaigns (each perhaps defined as a LOV bucketset):
    DEODORANT: SPORTY, TRAVELER, GREGARIOUS
    E_READER:STUDIOUS,TRAVELER
    BREATH_MINT:TALKATIVE, GREGARIOUS
    HELMET:TALL, CLAUSTROPHOBIC
    So we want to create a service to check: Does a person belong to the BREATH_MINT campaign? We extract their aspects and check to see if ANY of them are in the BREATH_MINT campaign. If so, we return true. Basically: return ( intersection( BREATH_MINT.elements(), person.aspects() ) ).size() > 0
    The problem is: what's the best way to implement this using Business Rules? Functions? Decision Functions? Decision Tables? Stright IF/THEN? Some combination of the above? I find I'm fighting the tool, which means that, although this is a fairly simple problem, I don't understand the purpose of the various parts of the tool well.
    Things to consider:
    Purpose: test a person for inclusion in a specific campaign
    Input - the person's aspects, either directly, or extracted from the person
    Output - a boolean
    There can be a separate service for each campaign, or it could be specifed by an enumerated value as a parameter.
    Many thanks in advance!
    ~*Completely Fabricated~
    Edited by: 842765 on Mar 8, 2011 12:07 PM - typos

    hey, i am also intrested in any tips. we are gearing up to use ARD for all of our macs current and future.
    i am having a hard time with entering the user/pass for each machine, is there and eaiser way to do so? we dont have nearly as many macs running as you do but its still a pain to do each one over and over. any hints? or am i doing it wrong?
    thanks
    -wilt

  • RDM Configuration (Best Practices...)

    Folks,  when attaching multiple RDM's on a VM, would you add one RDM per vSCSI adapter, or would you add multiple RDM's to the same vSCSi adapter?
    Also,  when creating the RDM would you keep it with the virtual machine, or store it on a seperate datastore (RDM pointers)?
    Just looking for some best practices. 

    Stuarty1874 wrote:
    Folks,  when attaching multiple RDM's on a VM, would you add one RDM per vSCSI adapter, or would you add multiple RDM's to the same vSCSi adapter?
    multiple
    Also,  when creating the RDM would you keep it with the virtual machine, or store it on a seperate datastore (RDM pointers)?
    Keep it the same
    Just looking for some best practices. 
    Also you might find this good
    http://pubs.vmware.com/vsphere-50/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-50-storage-guide.pdf
    start with p135

  • Need best practice advice on RAC 2 nodes configuration/setup

    I need to implement 2 RAC nodes with linux redhat 5.
    Right now I did ifconfig, and it shows:
    ifconfig | grep "^[eb]"
    eth0 Link encap:Ethernet HWaddr 18:03:73:EE:7E:7F
    eth0:1 Link encap:Ethernet HWaddr 18:03:73:EE:7E:7F
    eth0:2 Link encap:Ethernet HWaddr 18:03:73:EE:7E:7F
    eth3 Link encap:Ethernet HWaddr 18:03:73:EE:7E:81
    eth3:1 Link encap:Ethernet HWaddr 18:03:73:EE:7E:81
    eth4 Link encap:Ethernet HWaddr 18:03:73:EE:7E:83
    eth5 Link encap:Ethernet HWaddr 18:03:73:EE:7E:85
    I did not see any bond0 or bond 1.
    I think oracle recommend privet interconnect to be bonded. We use CTP-BO , so I want to know should I request to bond the interface plus service?
    What is the command to test that the interface are setup right?
    Thank you for all the response in advance.

    Which version are you setting up and what are the requirements? IF you are discussing the use of NIC bonding for high availability beginning in 11.2.0.2 there is a concept of "High Availability IP" of HAIP as discussed in the pre-installation chapters,
    http://docs.oracle.com/cd/E11882_01/install.112/e22489/prelinux.htm, section 2.7.1 Network Hardware Requirements.
    In essence, using HAIP eliminates the need to use NIC bonding to provide for redundancy.

Maybe you are looking for

  • How can I get iCal alarm to sync with my iPhone 4?

    My iCal alarm won't sync with my iPhone 4 if I add the event using iCal on my Mac. I find that if I set an alarm on iCal, I only get an alert on my computer. If I add an event on my iPhone, I get a pop up alarm on both the phone and the computer. I w

  • Problem concerting spool to PDF format

    Hi all, I am trying a small program to write ABAP list to spool, and within the same program I am trying to convert the spool into PDF format. I am including all the code , please can any one check and tell me where I am going wrong. I am getting a m

  • How to reset/delete autocomplete entries in file info metadata?

    I've got some autocomplete junk in some fields of the file info metadata - how do I delete it? Vista 64. Thanks.

  • How to create a type table in designer 9i

    Hi In our company we use designer 9i. I want to create a type table using designer. Is it possible? I have a requirement where i need to create a type table and use in creating a view through designer. Create or replace type varchar2_ntt as table of

  • Retina MacBook Pro - Logging Out

    My Retina MacBook Pro is automatically logging me out while I am in the middle of using it! For the past 4 days, I'll just be sitting here at my desk, browsing the web, or working on an e-mail, and the next thing I know, I am being logged out and pre