How does a mail server work

April 11th, 2011 | Posted under Internet Trends, Software, The Internet, Web Hosting Tips | No Comments »

How does a mail server work

how does a mail server work

Imagining the world without emails is virtually impossible. It is the only way by which people who are thousands of kilometers away can send as well as receive letters in fraction of a second. For you to send an email, you should have an email client on your machine. The first modern type of email was sent in the year 1971.

An email is sent with the help of an email server. An email server is like a computer that serves the purpose of an electronic post office. It is capable of sending and receiving millions of emails simultaneously and consists of hardware as well as software components. Email servers are basically of two distinct types depending upon the software that is used by them. One is the SMTP and the other one is POP3. These two protocols do almost the same job with just minor differences in their algorithm that they implement to get the work done.

Email servers work only with registered email clients. If the email server receives an email from one of the registered clients, then it performs the following tasks.

Checking for registered clients

At first after an email is received the server checks whether it is from one of the registered email clients on the basis of which it either takes an incoming email or rejects it. An email is received by a server through port 25 if it is a SMPT protocol or through port 110 if it uses a POP3 protocol.

Separate the username and the site name

The server then separates the user name and the site name and in case the site name and the mail site to which it will be sent are the same then it is sent to a POP3 or IMAP server for the rest of the process to be performed.

Request DNS for IP address

In case the recipient email address is different from the sent address then the server will contact the domain name server or the DNS and request for the IP address of the mail client to which your mail is to be sent.

Storing the mail in a database

The mail is then stored in a database on the server before it is sent to the receiving email id.

Resending and generating suitable error message

In case the SMTP server cannot locate the IP address of the recipient mail server, then the mail is queued and periodically sent for a fixed number of times before a message sending failed message is generated stating the reasons for its failure.

how does a mail server work

These are the basics of the working of an email server. Though various servers may have some small modifications but the basic working remains the same. The main job of an email server is to receive a message from the registered clients and then send it to any recipient address. Attachments are extra files that may not always be text and hence they need to be first encoded into text format and pasted in the main mail by the server itself before they are sent.

Host your web server from Bounceweb Hosting for best results!


How to create your own font

April 11th, 2011 | Posted under Internet Trends, The Internet, Web Hosting Tips | No Comments »

How to create your own font

How to create your own font

Nowadays every computer already has some pre loaded fonts that are installed in it at the time of purchasing your computer but even after that, there may come a necessity at times in order to create your own personalized fonts to give a personal touch to the work that you are doing.

For creating your own fonts you may either choose to draw them on a piece of paper and then scan it for which you would definitely require a scanner but there is also another simpler way in which you can create your own font. For this you would require to use the software ‘private character editor’ which is present in the system 32 folder in your programs file. This is almost same as the Microsoft paint but it is specially designed for generating new characters. With the help of this software you can create your own fonts and then incorporate them into a document using the character map.

The various steps that you must follow in order to create your own personalized character are the following

Run the private character editor software

First you must start the private character editor software. The location of this software on your computer is the following C:\WINDOWS\system32\eudcedit.exe.

Chose the character code

As soon as you run the software it will ask you to select a code that is the character that you are going to create will be related to that particular code in the windows character library. You can select any of the grey boxes and then press OK to continue.

How to create your own font

Opening the grid as your workspace

A grid opens up next of dimensions 50*50 and each character that you draw on the grid by coloring the boxes is stored as a bitmap image. You can access the coloring and drawing tools from the TOOLS menu.

Draw the character

The next step is the most important as now you need to draw the character on the grid. This requires a lot of practice and should be done carefully. Use the left mouse button to draw in black and vice versa.

Modify an existing character

If you are not good at drawing then you can also choose to modify an already existing character and personalize it for which you simply have to copy it to the grid by choosing the edit option and then copy character.

Associate it with a particular font

After you finish this part of your job you need to associate the newly created character with a specific font or with all fonts present in your computer from where it will be available.

Save your job

Save the final character which gets saved in the same position that you had chosen while you were asked to select the code.

Following the above steps you can create your own set of characters and use them accordingly in order to give a personal touch to any document. For accessing the characters from any application you just need to open the character map and select the particular set of characters that you want to use. One thing that you must keep in mind is that if you use your personalized set of characters in any document, then you won’t be able to view your document in other computers unless you install it in that machine too.

How to create your own font

Create cool new fonts and deploy it on your web server from Bounceweb Hosting!


Clustering of web application

April 6th, 2011 | Posted under The Internet, Web Hosting, Web Hosting Tips | No Comments »

Web Application Clustering- Networking Made Easy

Clustering of web application is necessary when continuously available, high-performance and secure web application is the main concern of a business. When several parallel servers are required, clustering is done to run an application. This is technically called cluster nodes. The vital advantage of clustering web applications is that when the load is distributed among different servers, then even if there is a server failure, the application would be still available via other nodes of the cluster. This clustering process finds its maximum application in scalable enterprises, where the performance can be further improved by adding more nodes to the cluster. Several servers provide this clustering process. One of the most famous is the JBoss Application Server (AS) and Sun Secure Application Switch, which supports clustering out of the box.

For simple clustering, encryption and failover, web servers include Software load-balancing and Encryption plug-in, to place it on a web proxy server. In large-scale deployments, load-balancers and hardware accelerators are necessary for firewalls and encryption. But complexity arises because the hardware used is from different vendors. Also reliability, correctness and interoperability may endure huge costs and waste time. This gives way to alternative method of web clustering, which combines failover, load-balancing, encryption services, into one single device.

Clustering of web application

The above fig shows the clusters and server nodes.

The 2 vital benefits of clustering of web applications are

Virtualization of Switch

In this application, a multiple and virtualized load-balancer and security domains are created in a single switch. Device resources may be partitioned into multiple virtual switches, each with application of switching, Secure Socket Layer (SSL) acceleration, load-balancing and management policies and quotas. The main advantage of creating virtual switch is to obtain healthy isolation of traffic in networking which otherwise requires firewalls and complex access-control rules.

VLANs and L4 and L7 load-balancing

This runs parallel with virtual switching. The strong virtualization consolidates multiple web infrastructure networks into a single device.

A Sample Application and Its Deployment Architecture

Clustering of web application

The above figure shows Deploying a Single Application-Server Cluster where the configuration of content delivery portals or large intranets. The sample application like ‘clusterjsp’ shows the process of load-balancing and failover function.

Creating Server Cluster Application

Simply a cluster can be created with 2 server instances running on 2 distinct hosts (machines) or one can complete the process by running the 2 instances on the same host on different ports.

Clustering of web application

The cluster can be simulated in two ways

By using Project Glassfish, application-server of Java platform, Enterprise Edition 5 and Sun Java System Application Server Enterprise Edition 9 can be implemented. This whole process will take only 30 minutes.

Another way is to adopt this option using administrator privileges on the test systems and evaluate the advanced management, high availability and monitoring capabilities.

Configuration of Application Switch

3 ways to configure Application Switch is possible-

HTTPs Web Interface.

Secure Shell (SSH).

Telnet-accessible command-line interface (CLI).

Connection To Application Switch

One can connect to the Application Switch from the Administrator Console.

After this final testing of the sample is done for allowing it to be used as a cluster network of Web Applications.

Bounceweb hosting enables you to cluster your web applications for the best effect.


FTP User Guidelines and Advantages

April 6th, 2011 | Posted under The Internet, Web Design Tutorials, Web Hosting, Web Hosting Tips | No Comments »

FTP User Guidelines and Advantages

File Transfer Protocol also abbreviated as FTP is a method used for downloading and uploading files from websites. It is used for logging in to a website to download or upload files. It is also used for the transfer of files though the internet and is followed as it is a very convenient and speedy procedure. In older systems with DOS as operating system FTP is accessed using command prompt while in latest systems menus are used and all the steps are clearly mentioned. This protocol is a standard one used by most users. It is also essential to web site builders.

FTP User Guidelines and Advantages

Categories of FTP

The software packages that FTP comes with are FTP Explorer, Cute FTP and Elite FTP. From the above three mentioned package Cute FTP is the best one. As it has many functions and its usage is very convenient, it has been licensed and one need s to register for it while Elite FTP and FTP explorer are freeware and can be downloaded from the internet. Elite FTP might not work properly in few web servers.

Even secure FTP services are available on the internet so that one’s computer doesn’t get affected by malware and spyware.

FTP User Guidelines and Advantages

FTP Usage

For accessing FTP services one has to fist download the file from the internet and Smart FTP is used widely. Upon launching the program at first a screen appears which is called the startup screen where one can add his/her personal information. The basic details required are profile name, host type, host address, user id as well as a password.

Mechanism of File Transfer

Double click on the files to check its content. For transferring a file click on it twice or highlight it and select the option of file transfer. Multiple files can also be downloaded by selecting them but it should be ensured that they are in the same modes.

FTP User Guidelines and Advantages

Commands used in FTP

The basic commands or file permissions used are read, write, execute and none. Number 4 or r can be used for enabling read permission. 2 and w are used for enabling write. Letter 1 or x enable execute permission and none is enabled using zero.

FTP User Guidelines and Advantages

Advantages of FTP

Compared to standard HTTP downloads FTP provides a very much high speed which is its major advantage. Its interface is user friendly as one can drag the files and then drop them in order to download or upload them. It had many more added features like TSL support; SSL, queuing utility and many features for back up too. These reasons are the basis for stating the use of a FTP client in order to host a website. Cute FTP is highly recommended by experts as it ensures easier, faster and safer downloads.

For a user who is taking care of his own website it is essential that he uses a very good FTP program as it provides a lot of flexibility and independence while controlling the files and ensuring a safer connection and protecting one’s computer.

Transfer files in a jiffy using FTP and Bounceweb hosting!


Using JavaScript and PHP to validate forms

March 12th, 2011 | Posted under The Internet, Web Hosting Tips | No Comments »

Using JavaScript and PHP to validate forms

When we need to construct a website the most important thing that we need is a form, which is considered as the best method of collecting vital information from the visitors. The size and content of the form varies according the requirements like the subscription membership form is very large compared to login form, as it requires a lot of more information than the later. As the size of the form increases the processing cost and time increases and also it requires more advanced and expert programmers to solve this challenge.  The two important fields where need to focus about these forms are the gathering and intrusion to gather maximum useful data from the visitors. With the help of some tools we can eliminate almost ninety five percentages of intruders and letting visitors to provide only that useful information that we want. Such for optimization tools for inspection is available for both server and clients. The most popular tools on client side are various types of scripting languages, like Java-script, which is the most popular one for limiting and checking of form data. Similarly on the server side the recognized tool is known PHP.

Subscription membership form

using java-script and php to validate forms

Login form

Using java-script and php to validate forms

Facts about JavaScript

Java script as specified above is the most popular scripting language on the client side for designing web pages. The code of Java script is in HTML format and it works without any intervention of the client but can be modified by the client according to the requirement. Also the effects of the java script remains with the client till it is being submitted to server. This is not a programmable language rather a scripting language on the client side and deals with the objects on web pages.

Loophole of JavaScript

This scripting language is not a secured tool, as the main source files are sent to clients. Java script also sets some set of rules to prevent the use of the tool for evil intension but experts are able to break these rules to design malicious objects. So use of java script for form validations should be done with proper guidance.

Utilization of JavaScript and PHP for reducing traffic

Java scripts are capable to control the HTML objects and are able to control the network traffic s between the client and the server. When we have the access of bout java script and PHP, then we allow the java script to first check the constraints and also the client side, the rest of the work is handed to the PHP to manage the server side traffic and other related matters on the server side. Thus java script and PHP together helps in controlling the traffic and makes the process of validation of form more comfortable.

Data transfer operation between PHP and JavaScript

Sometimes there is a need to send some data back to client from server side for validation process. PHP has this feature too to send back the data to java script. This can be done by two ways, the first way is to add the PHP code directly in <> so this is can be easily identified by the java script and the second way is to inject a hidden input field to the page and integrate its value with the PHP. This feature allows a bidirectional data transfer making form validation more convenient.

Forms look a lot better when created using PHP with JavaScript and Bounceweb Hosting!


Relevance of PHP in the world of Web 2.0

March 12th, 2011 | Posted under Internet Trends, The Internet, Web Hosting Tips | No Comments »

Relevance of PHP in the world of Web 2.0

Relevance of php in the world of web 2.0

This era is considered to be a digital age and everything is related to the cyber territory. Whenever we consider our daily works, more or less 90% works are related with web that means 90% of our works are done in web like banking, job, reservation, chat, social networking, education, selling and what not. So, the web is totally covered the lives of human beings. Here comes the need of web interface to interact with the end users. And that is why the web programming languages comes into being.

Web Programming Languages

As the web is advancing forward, the web programming languages are being developed day by day with advanced characteristics. There exist many web programming languages like PHP, ASP, VB.NET, ASP.NET, JAVA, PYTHON etc. But amongst the aforesaid programming languages, the web territory in programming language, the PHP holds a large space. PHP was initially developed as Web Programming Language and later on PHP can be used in any case like Desktop Application Development. This web enveloped world is totally configured using Web Programming languages and PHP does this using its sophisticated advanced classes of syntax.

Web 2.0

Web 2.0 is totally a weird term to be explained. Initially web interface is developed with a minimal interaction signal events and later on, now web interface can be used for any work and now it includes many function abilities. This is called Web v2 or Web Version 2. And now-a-days it is seen that amongst all other web programming languages, PHP is wide-spread.

PHP Web Programming

PHP as a web programming language holds top place for web application development to interact with the end users. PHP is wide-spread as it contains many inbuilt functions to take the load off the web programmer and eventually it also includes many external advanced framework classes and extensions to work with the web 2.0 much better. PHP mainly uses extensions and modules. Extension and modules are extended libraries and classes to extend the programming interface to greater extent. For web application development, many frameworks are needed for security measures and even for socket connection; we need some extended modules or extension to work on sockets or protocols. For these, PHP can be easily used in large extend after loading the extensions. Even if we consider, social networking arena, PHP holds the top place as Facebook is totally developed using PHP. Even network programming can also be done using PHP. But for web 2.0, network programming or socket programming is not needed too much. We only need extended frameworks to work with the web 2.0 to better understand the relevance of PHP in this arena. Now-days, 99% websites are developed using PHP Frameworks like Joomla, Drupal, XOOPS, Froggy loops, phpBB, SMF and many more. These are extended version of php that includes many classes of their own to configure the web 2.0 according to the MVC design patterns.

PHP is largely used now-a-days but other web programming languages like python can also be used in large extent but not comparable to PHP as Orkut is made using Google-Python API, the Twitter is also made using Twitter-python API. Though if we consider in Toto, then PHP takes the top notch place in web 2.0 for interacting with the end users.

Host your PHP applications on Bounceweb for the best experience!


AJAX and jQuery

March 2nd, 2011 | Posted under The Internet, Web Hosting, Web Hosting Tips | No Comments »

AJAX and jQuery

AJAX

Asynchronous JavaScript and XML, or AJAX, allows the client side of an application to communicate with the server side of the application. Before AJAX was introduced, there was no other communicating channel, through which the client party of any web application could directly communicate with the server. Instead, page loads would have to be used. However, with the development of AJAX, the client and the server can communicate swiftly and easily with each other. JQuery is a library for developing AJAX based applications which allows programmers to be simple and concise while developing JavaScript. JQuery can also be used to handle events and develop animations, while at the same time seamlessly adding AJAX support to web applications.

Uses of AJAX

AJAX scripts are usually activated by a mouse click on the side of the user, after which a request is sent to the server-side script (like PHP, ASP), using XML. The server side script accepts the input from JavaScript accesses the database and processes the requisite data. This data is then sent back to the client side of the application using XML. A JavaScript function called the callback function caches the data and updates the web page.

Login

AJAX also finds use in networking sites, where instead of going to a login page and then moving to the page you originally wanted to go to, AJAX allows you to enter your login credentials directly in the original page, from where a request is sent to the server to log the user in. The sever lets the browser know that the user is logged in, and the current page is then updated as required.

Voting

AJAX is also used by some popular sites to decide the content of the sites through voting.

AJAX and jQuery

Search suggestion and Auto Fill

Google was one of the first heavyweights to implement AJAX in their search suggestion tool, as well as auto-complete applications, which used AJAX to search and suggest for possible results after every keystroke.

AJAX and jQuery

AJAX is also used for several other purposes like light boxes, which have replaced conventional and irritating pop-ups. AJAX also finds use in chat servers, where two main AJAX processors work as the “eyes” and the “ears” of the server.

jQuery

As far as the advantages of jQuery are concerned, one of the principal reasons why it is so popular among website developers is the fact that it is much more lightweight, easy to use and relatively faster than other commonly used libraries. Using jQuery, it is possible to develop concise scripts as compared to other libraries, which make it further possible to develop to perform a large array of functions using lesser complicated and extensive coding. Another advantage that jQuery has over other libraries is that it is compatible with all browsers, which eliminates the necessity to develop separate client side codes for different browsers. JQuery’s principal advantage is its ability to develop lightweight AJAX applications in ASP.Net using JSON support, thus bulky ASP.Net codes can be avoided. The functionality which is provided by the jQuery library can also be extended, and using jQuery also makes it possible to incorporate several templates freely available on the Internet.

Use jQuery with Ajax and Bounceweb hosting to make your applications faster!


Rapid web-application development with Ruby On Rails and MySQL

March 2nd, 2011 | Posted under The Internet, Web Design Tutorials, Web Hosting, Web Hosting Tips | No Comments »

Rapid web-application development with Ruby On Rails and MySQL

Rapid web-application development with RUBY ON RAILS and MySql

“Ruby on Rails” generally shortened as RoR is one if the best web application development framework available for the Ruby programming language. It is intended for use with “Agile Development Technology” which helps in creating rapid web application development. It was first created by a person named David Heinemeier Hansson in July 2004 under an open source license. From then onwards about six versions of this toolkit has been released.

Technical overview

A lot of recent developments have added many new packages and up-gradations. Major developments include,

Efficient built-in engine

The built-in engines helps reuse the application codes along with view paths and models. Like many other available frameworks RoR uses MVC (Model View Controller) architecture pattern to develop applications. The commonly used tools are now preinstalled in the package. WEBrick, a simple ruby web server is also given with the distribution. The extensive use of JavaScript libraries like Script.aculo.us and Prototype for Ajax makes the web framework very noteworthy. The most recent version of RoR also use a technique called Unobtrusive JavaScript. This functionality actually separates the main logical part of the application from the structure and other related parts of the application.

Modular Nature

Ruby runs using the Matz interpreter as its default but it has been criticised by many for issued on scalability. Merb now comes integrated with RoR, and it has given a new structure to the whole system with modular coding interface. Earlier the Ruby developers had to use very specific sub-frameworks to be developed on applications but now this is changed forever. The choice between the sub-frameworks likes ORM, jQuery, DataMapper or JavaScript can be made without hassle.

Default templates

Large number of default templates is included out-of-the –box. It eases developing the basic structure of the applications with customisations and configurations. When developing an application today we look forward to fast code generation because of a very fast changing web world. The whole package of Ruby on Rails along with MySql makes sure we follow their principles “Convention over Configuration” and “Don’t repeat yourself”. The first principle states that we have to just create the code for the unconventional things we are using in the web application, the code generation of the conventional things will be taken care of through templates. The second principle states that we do not have to repeat every detail or code of a newly included object. The parameters linked to it will automatically be configured to make it work.

Easy interface

The new “Rack server interface” and “Metal” helps the developer to write optimised code fast and easy. These interfaces allow very highly configurable “middlewares” applications to be integrated with “Ruby on Rails”

Easy integration with MySql

All important web applications have a database running behind the scenes, to manage all the huge data generated from the corporate servers. This is where MySql comes in handy. It is the best known database management application in the world running. From small to gigantic databases it can manage all of it with ease and also is licensed under open source software.

Each passing day more and more developers are shifting to this. It is one of the best available rapid program development environments for web designers.

Rapid web-application development with RUBY ON RAILS and MySql

Enjoy making ROR applications on Bounceweb hosting!


Optimize e-commerce applications with Ajax

March 2nd, 2011 | Posted under The Internet, Web Hosting, Web Hosting Tips | No Comments »

Optimize e-commerce applications with Ajax

Due to the rapid technical advancement in the field of electronics, the world is becoming very easy day by day. Electronic commerce most commonly known as e-commerce is the result of such technical advancement. With the help of this advanced electronic system one is able to buy and sell products and services   over Internet and other miscellaneous computer networks. It involves electronic fund transfer, all sorts of online transaction supply management, Internet marketing, electronically data interchange, automated system for collection of data and inventory management. Electronic commerce mostly uses World Wide Web for the entire transaction. Also a major percentage of electronic commerce are regulated electronically for items such as permission to premium account of a website and also transportation of goods and services to some destination place, the most common such e-commerce website is eBay. The online retail shops over e-commerce are known as e-tailers or e-tail. Almost every big retail shops have their products hosted on World Wide Web via e-commerce technology.

E-commerce website

optimize e-commerce applications with ajax

Reason for rapid growing popularity of e-commerce

Though today the level of popularity of e-commerce is not so large compared to normal marketing strategies, but the rate at which this popularity is increasing day by day and this is really very encouraging. But the entire credit for this growing popularity of e-commerce is due to the rapid advancement of various types of modern web applications, which has given a new definition to the world of World Wide Web. The most common web application globally accepted by most e-commerce websites is known as Ajax. The ecommerce websites integrated with Ajax has gain high mass popularity in these recent years.

What is Ajax

Ajax stands for “asynchronous JavaScript and XML”. The term asynchronous have a key meaning, which determines the asynchronous behavior that occurs in a site that is the site is able to send reverse query to that server even if the page is not refreshed. This feature helps in speeding up the web application processing. Though normal Ajax request may not be asynchronous or may not work with the XML code, but these integrated features makes this language more recognized among the people.

Ajax interaction with system hardware

Optimize e-commerce applications with Ajax

How Ajax optimizes e-commerce application

Ajax is very much useful when we don’t want any server call and mainly when the designed webpage is completely dependent on the user input and also when the information required is completely in different state. Keeping in track all these requirements is helps a lot in optimizing the electronic commerce.

Ajax web application

Optimize e-commerce applications with Ajax

Form submission on e-commerce sites using Ajax

Form submission through Ajax is different from normal form submission. When a form is submitted using Ajax by giving the username and password, then the submit button is dynamically triggered and also it do not require any type of page refreshing. Then it automatically informs us whether we have successfully logged in or not. So, saves the time of page refreshing and mouse clicking while form submission.

Thus Ajax is really a very powerful weapon for developing e-commerce applications and is gaining much popularity day by day.

Host Ajax applications quickly and efficiently with Bounceweb Hosting!


A Beginners Tutorial to the Gems Package

February 21st, 2011 | Posted under Internet Trends, Software, The Internet | No Comments »

A Beginners Tutorial to the Gems Package

Rails is an application developed in the Ruby language which helps in development of Rails application. Rails is designed to make assumptions about what developers need to get started, so that web application development becomes much easier. Using Rails, developing web applications becomes much easier, at the same time; the coding process becomes less extensive and much more simple. Rails is basically functions according to an ‘opinionated’ logic, wherein the logic decides on the ‘best’ way to perform the work, and encourages the user to follow that path. The ‘Rails path’ will probably lead to the best productivity.

A Beginners Tutorial to the Gems Package

RubyGems

Rubygems is a Ruby software library manager. A Ruby code packaged in this manner is called a gem. For example, when you find the required Ruby software for any particular project, you can download, install and manage the software using gems. The first RubyGems project was created by Ryan Leavengood in 2001. The initial focus of RubyGems was on simplifying the process of installing, removing, updating and managing Ruby libraries. An innovative twist was added by the new developers when they provided the system with the ability to manage several versions of the same library easily. Using RubyGems, it is possible to provide very powerful control over which version of the library is to be used by the code.

Gems Tutorial

Installation

First of all, you need to download the current version of RubyGems. To install the software, you need to type in

ruby setup.rb all

Gem Command

In RubyGems, the gem command is the command which is used to interact with the RubyGems package system. To test it out, type in:

Gem list

It shows a single package-source installed.

Installing gem packages

The next step is to begin installing the required gem packages in the machine. Once again, as is required in case of installation, you need to be the root in order to install any gem packages or modify them. However, any user can query the system to find out which packages have been installed in the system. RubyForge is one of the most popular resources from where Ruby open-house software can be downloaded. Ruby on Rails is a popular RubyForge project which uses the RubyGem package. The following command can be used to install the Rails gem:

Gem install rails –include-dependencies

A Beginners Tutorial to the Gems Package

RMagick, a Ruby interface used for ImageMagick, can be installed using the command

Gem install rmagick

As this gem includes a non Ruby code, it compiles the C code as a part of the installation process. In case the compile tool is not installed beforehand, the installation fails.

Other uses of gem command line

Other features which are offered can be accessed by the following commands

Gem update

Updates all the current versions of gems to their latest versions

Gem cleanup

Removes old versions of gems which are installed

Gem uninstall

Removes a particular gem from the repository

The command

Gem server

Automatically launches a Ruby based server on port 8808. Adding the –p option to the code will allow the server to be launched on a different port. This makes it relatively simpler for your web server to view the documentation on all the gems that are installed on your machine to learn their API. In case the rdoc is already installed on the system, gem will automatically generate the rdoc for every gem installed.

Using libraries for Ruby scripts

In order to use the Ruby libraries while executing the Ruby scripts, the require  mechanism can be used in the following manner:

Require ‘rubygems’

This will automatically load the RubyGems code and allow the script to use the latest version of the Gem installed in the machine.

Make the most of Web 2.0 by hosting Ruby on Rails application only on Bounceweb!


Previous Entries Next Entries