Wednesday, January 7, 2009

Choosing a Web Application Programming Language

Among computer programming languages, there is no single application that does all the different things, in all the different ways, that programmers need. Because of the great number and diversity of programming tasks, choosing a web application programming language has become a critically important step.
Fortunately, there is continuing development in the field, and today the number of capable applications is expanding. Database-driven websites can now be built with such varied scripting languages as PHP, ASP.NET, JSP, Perl and Cold Fusion, which fall into two main groups – proprietary and open-source. In the foregoing examples, all are open-source except the proprietary Cold Fusion and ASP.NET.

PHP pros and cons


As an open-source application, PHP was developed (and continues to be developed) by an active, engaged, international community of users. This is a great example of strength in numbers. Another strength of PHP, of course, is cost. It’s free.

Because it is free, open-source software, PHP can be compiled and “tweaked” for most any operating system. In fact, there are even pre-compiled versions available for the majority of operating systems, both commercial and freeware.

You can also relax a bit more with PHP, as you can count on its being updated and improved more often than other languages. In an open, collaborative and non-hierarchical environment, suggested improvements can be adopted quickly. Again, this is a strength that is derived from its open-source status.
PHP is a mature application, though younger than Perl, for instance. However, it does have a few weaknesses that may be minor annoyances to some, but deal-killers for other programmers. Its lack of event-based error handling means that your workflow may be interrupted by a sudden jump to a special error-handling section. Finally, its lack of case sensitivity for its function names will run afoul of many professionals’ long-established work habits.

ASP.NET = flexibility


ASP.NET is arguably the most flexible of the programming tools, and “plays nice” with both scripted languages (VBScript, Jscript, Perlscript, Python) and compiled ones (VB, C, Cobol, Smalltalk, Lisp). This flexibility is also apparent in the application’s compatibility with such development environments as WebMatrix, VisualStudio.NET and Borland’s Delphi and C++ Builder.

On the downside, ASP.NET is a memory hog and somewhat slower to execute than its competitors. For this kind of application, that can be a serious weakness – on the Internet, it may be called upon to scale to thousands of users per second. Its memory usage can easily become problematic on your server.

JSP (Java Server Pages)


JSP is an open-source scripting language supported by Oracle, so developers can use Oracle JDeveloper to create JSP pages. This can be accomplished without having to learn the Java language first, relieving you of the task of writing Java scriptlets. It is also extensible, allowing Java tag library developers to outfit it with simple tag handlers that use a new, simpler, cleaner tag extension Application Programming Interface (API).

JSP has integrated the JavaServer Pages Standard Tag Library (JSTL) expression language, and it now supports functions. This greatly eases the creation and maintenance of JSP pages.

The most significant disadvantage of JSP is that there is no XML-compliant version of JSP comments, forcing developers to use client-side, HTML/XML-style comments (or embed Java comments). Depending, once again, on your particular needs, this may or may not be sufficient reason to eschew the use of JSP.

A shiny Perl


An open-source language that is both mature and powerful, Perl offers web developers about every tool they need to create dynamic web pages. Like other open-source languages, it benefits tremendously from ongoing development, and the support offered by its international community of users is second to none.

Perl is particularly good for creating single websites quickly, cleanly and elegantly. If it has a major identifiable weakness, it is that it may be unnecessarily complicated. If you are not comfortable switching gears among a variety of syntaxes, it may not be the best tool for you.

The real ColdFusion


Originally built by Allaire and then purchased by Macromedia, ColdFusion is now owned by Adobe. It is very easy to get started building websites with it, and you can deploy powerful web applications and services with less training – and in less time, using fewer lines of code – than with PHP and JSP.
ColdFusion is now at version 8, although many programmers are still using the various iterations of ColdFusion MX, variously known as ColdFusion MX 6, ColdFusion MX 6.1, ColdFusion MX 7, ColdFusion MX 7.0.1, ColdFusion MX 7.0.2, ColdFusion 7, ColdFusion 7.0.1 and ColdFusion 7.0.2. However, ColdFusion MX to ColdFusion 8 is a valid upgrade path. In fact, upgrading to ColdFusion 8 is supported for the two most recent previous major releases of the program.
ColdFusion supports most major databases, from Oracle and Sybase to Microsoft SQL Server and Access. With its own markup language (CFML) and tags to connect to the database, it is relatively easy to create forms and dynamic pages. It also has all the benefits of CGI for today’s broadbased developers. Its weaknesses are few, but expert users will caution that it is probably the most difficult to maintain.

Bottom line


Secure and scalable web applications are important to every business with an Internet presence (which is every business today, isn’t it?) and can directly affect productivity, sales, reputation and profits. If you want to develop a web application and do not have the expertise in-house, any number of reputable web development firms can help you determine the right tools for your task.

Whether your application development happens in-house or with outside assistance, it is important that management understands the basics. You don’t have to become a programmer, of course, but to make good business decisions you do need to know what these powerful tools are all about. As long as you learn enough to help make the appropriate decision, you can leave the actual coding and compiling to the experts.


Moonrise Productions is a custom web design company specializing in custom web development and design. Whether you're in San Francisco, New York or you need social network web design – we're here to help and we have the team to do it right.

How Do I Set a Password For My Microsoft Office Documents?

Important or confidential documents need to be secured especially if it is in a computer in an office network where many people have physical access. Microsoft Office comes with a feature that allows for the optional setting of password to open and modify Word, PowerPoint, and Excel files. It is very easy to set the password for any of the three mentioned MS Office applications, all you need to do is to open the document you want to put a password on, then click "File" in the menu bar and then select "Save As" and then click on "Tools". Select "General Options" and then choose any of the two options presented--Password to Open, or "Password to Modify".

From the name of the two options probably you already have a clue as to how they will affect the document. Choose "Password to Open" if you want the document to ask for a password before it can be opened. If you choose "Password to Modify", the document will ask for a password before it saves any changes made in its content. You can also check the "Read-only recommended" option. And then, after choosing the kind of password security to be applied to your document, click on OK. You'll then be prompted to type the password you've created to confirm. After clicking "OK" again you'll be back to the "Save as" dialog box. Click on "Save". Click "Yes" if a dialog box pops up and asks if you want to overwrite the existing document.

Mr. Sanket is a Computer Support Specialist for more than 22 years. Has a Bachelor of Science Degree in Computer Engineering, MS Research work in Systems Engineering.

Get more free computer tips on his blog at

Article Source: http://EzineArticles.com/?expert=Pinky_Mcbanon

Tuesday, January 6, 2009

A Few Tips to Help You Become a Successful SAP Developer

Who wouldn't like to become a successful SAP developer? It's a fantastic job to have that is not only intellectually rewarding but financially rewarding as well. However; bear in mind that you must have a certain level of intelligence and education before you even consider taking the necessary steps to becoming a SAP developer.

Know SAP Products

SAP employs a huge number of consultants that work in conjunction with SAP developers. This is because SAP is a consulting firm that in turn developers and sells the products that the consultants recommend. Of course this would also means that your knowledge of SAP products must be complete.

More Stuff to Know

Also, because SAP consultants serve a wide range of business genres, ranging from all areas of the chemical and petrochemical industries, as well as other industries including all types of manufacturing and wholesaling industries, it does help if you possess some level of expertise in some type of business or industry.

No Place for Wimps

However; you have to bear in mind that SAP developers and consultants work in world filled with ambitious type A personalities, so the stress level can be very high at times. What this means is that if you are not entirely up to the challenge then you may want to reconsider other career options.

Willing to Think Out of the Box

However; the pay and benefits for a good qualified SAP developer are among the best that you will find anywhere, so if you like good money then you will like being a SAP developer. So, if the bad economy has gotten you down, don't fret because there are still plenty of god job opportunities out there for people who are willing to think out of the box such as SAP developers do.

Written by Fernando Vargaz. Find the top information on sap developer as well as sap consultant

Article Source: http://EzineArticles.com/?expert=Fernando_Vargaz

6 Easy Steps to Increase Vista Responsiveness in Just 5 Minutes Or Less

Step #1 - Use only anti-virus software that requires less system memory and processing power

Avira anti-virus free edition is such a tool that uses less system resources.

Step #2 - Disable Windows Error Reporting.

It will generate an error message when a program stops responding then it will send an error report to Microsoft in the hope that they will fixed the problem in future. Disable it will free up system's limited resources.

Step #3 - Disable Search Indexing

Windows Vista's Search Indexing is constantly checking the files on your system so that you can locate a file quickly. This is helpful, but it can slow down the system performance dramatically and user doesn't use search function frequently.

Step #4 - Disable All Graphics Effects

Vista provides "eyes catching" 3D aero glass and transparent effects. Those effects require large amount of graphics and arithmetic operations and it will severely slow down your system if you do not have a powerful graphics card and CPU.

Step #5 - Perform Disk Defragment Regularly

Disk fragmentation will slow down read and write access of a hard drive hence it reduces the responsiveness of a program and it will also Vista boot up time. Auslogics's Disk Defrag is a good tool that can defragment your hard disk quickly which is an ideal replacement of Vista default disk defragment.

Step #6 - System Registry Cleaning

The Windows registry is a directory which stores settings and options for Vista. Installing and un-installing programs and other daily activities actually create a lot of entries in the registry over time. After a while, Vista behave doesn't like when it was new, it stops unexpectedly, and its performances become sluggish. It is recommended that you use a free registry defragment tool to find out how many errors in you registry and get them fixed promptly.

Article Source: http://EzineArticles.com/?expert=Clement_Gee

Time Tracking Software Or Time Sheet Tracking Software

Time tracking software is also called time sheet tracking software, time tracking business software, time and attendance tracking software and employee time tracking software. It is used for managing time sheets for individuals in a business or company, help with the payroll and for settling accounts.

With the help of an efficient time tracking software, a business can save thousands of dollars that arise through unnecessary expenses because of inaccurate time keeping. Though it is possible to use stand-alone the software to record timesheets and create reports, it can also be integrated in the accounting system, billing system, payroll system or project management system of the business.

This software basically works by monitoring and registering the exact time and date each employee checks in and out of the company. So whenever an employee logs into the computer on reaching the office, the event is registered through unique identity codes. It is also possible for the employee to stop and start the clock for each client they attend to.

With all this, the time tracking software logs the amount of time an employee spends at work, while speeding up billing and financing work. This is because the manual payroll work like overtime and hours worked are handled automatically by the software.

Tips to choose the right software

While choosing the right time tracking software for yourself, you will find that there are many options available on the internet today. You can choose the best software for yourself by considering the features of the software. Choose one that is priced based on per client computer and not per employee. This proves to be cheaper to you as can track an unlimited number of employees with the software.

Choose a software that also lets employees send messages to peers and supervisors, log their time of work and the tasks they complete and even put in applications for leave. In fact, there are also some software where employees can deduct lunch times from the hours they have worked, for better calculations while paying employees' salaries.

The software should offer a thorough pay report

The time tracking software should offer pay reports with everything the accounting department will require like social security numbers, gross and net wages and a breakdown of the hours worked. You are to decide on the frequency of these reports, which can be weekly, fortnightly or monthly.

Of course, choose the time tracking software that you find easy to use, and is user friendly where all functions are clearly marked. Once you find such a software, you may as well buy and use it for better and efficient functioning of your business.

For further information, please visit Time Tracking Software

Abdul Hayi Mansoor

SEO Specialist and Article Marketer

Article Source: http://EzineArticles.com/?expert=Hayi_Mansoor

Pick Registry Repair Software You Can Count On

Registry repair software is a necessity for computer users. The registry contains the library of files that the computer uses in order to be able to function. These are common files that are shared between programs in order to make programs smaller.

They are incorporated into the operating system and without them key features of the programs are unable to function. As a result, this area of the computer is constantly in use.

This means that the files that are in this section of the computer need to be constantly kept up to date and old files need to be removed on a regular basis.

The importance of these files however indicate the need for caution when it comes to removing files that may have a significant importance to programs in your computer.

In order to ensure that you pick out a registry repair software application that is going to remove the files safely that need to eliminate without creating an issue with the programs and with your computer system. There are a few things that you are going to want to look for in this type of software application.

The first thing that you are going to want to look for is that the program allows you to do one of two things or lets you do both. This is to either create a restore point in your system or to back up the registry file.

If it allows you to create a restore point this will be available to you should anything happen and a file is deleted that is necessary for the function of the computer. A good registry program however, is going to be able to tell the difference between a file that is shared by system necessary programs and one that can be deleted.

The next thing that you are going to look for is a program that is going to allow you to schedule and update the registry back up automatically. While many people may want to do this manually, it is often times easier to have these scans done on a routine basis.

You are going to want to look for a program that handles the following file types, class keys, invalid keys and DLL files. These are the three major files that are going to be found in the registry, minor files may include shortcut files and other settings files but the keys and DLL files are going to be the most important things to look for.

Picking out a good registry repair software application is not as difficult as it seems. All you need to look for is a program that is going to allow you to back up your files so that you can correct any errors that are made and allow you to clean your registry on a regular basis, this means that it needs to have a scheduler.

You may also want to pay attention to user reviews. These will let you know if a program is user friendly and is going to provide you with what you need from a user standpoint. It is also important to note that you should not have to spend a fortune on a software application that can provide you with all these things. There are many programs which are suitable and do not cost a fortune.

Riley Edwards is a technician for http://www.registry2aid.com and tests many registry programs and places his results on the website.

Please feel free to look at the registry repair programs that have been reviewed to see which of the top programs carry the restore points, auto backups, and ability to handle numerous registry problems.

Article Source: http://EzineArticles.com/?expert=Riley_Edwards

Keylogger Remover

Do you wish to download a key logger remover program from the web? There are many different key logger removal software available for download. In this article, I will be discussing 2 important things that these software should be able to do for you. I would recommend against downloading any key logger remover without these features.

Keylogger and spy ware cleaner software are very essential programs to install on every computer today due to the increasing threat of key loggers, spy ware and adware that spread rapidly across the internet.

What Should a Key logger Remover Be Able to Do for You?

1. Detect all Potential Harmful Programs and Be Capable of Deleting Them Fast

This is the main function that the software should be capable of doing, yet not all anti-keylogger and antispyware programs are good at it. Every keylogger remover software will have a database that contains all the malware definitions. The software will only be able to detect the malware and keyloggers that is found in its database and it is important that the cleaning software you use has a comprehensive database of all the latest malicous programs.

Just as importantly is the software's ability to get rid of these detected files quickly. Surprisingly, there are some removal programs that find malicious software but are unable to delete them.

2. Automatic Updating Feature

Another important feature is that the cleaning software should be regularly updated with the latest file definitions. This ensures that your computer is protected from the latest bugs and threats on the web. The program that I use has this automatic updating feature, and you can download a copy of it at the website link at the end of this article.

Are you looking to download Keylogger Remover? Don't do it yet, because the author has found many bad spyware and keylogger cleaning software on the web. Read the author's review of the Top 5 Spyware & Keylogger Removal Software on the market now at http://www.review-best.com/spyware-keylogger-removal-software.htm first!

Learn to completely get rid of all the spyware and keyloggers on your computer in less than 5 minutes with a FREE PC Scan!

Article Source: http://EzineArticles.com/?expert=Donald_Chambers

Downloadable Virus Protection Software

Do you want to get downloadable virus protection software to remove any virus or other malware from your computer? In today's information age, it is becoming very easy for PCs to get infected by viruses. In fact, more than 95% of PCs that connect to the internet get infected at some point.

To make things even worse, viruses can be very easily programmed today that even 15 year olds have been to known to do it to infiltrate their school networks. It is one of the most dangerous forms of intruder attack, but luckily there are downloadable programs on the net that deal specifically with this problem.

1. What Can a Virus Program Do to Your PC?

It is all too easy for a virus program to infiltrate a PC system. One thing that you will want to avoid doing is visiting sites that are very likely to contain viruses, spyware and adware. Such websites include hacker, free download and pornographic sites. Once inside the system, a virus may seek to destroy all the files in the hard disk or lower the defensive capabilities of the computer to allow hackers to gain unauthorized access into the PC.

2. Are Online Downloadable Virus Protection Software Reliable?

I absolutely recommend using online download versions of antivirus and antispwyare programs as there are many advantages. One advantage is that they can be constantly updated with the latest versions and keep the PC protected against the latest viruses. Another advantage is that they can be downloaded instantly and conveniently.

3.What Can Downloadable Virus Protection Software Do For You?

This type of software can keep your PC running safely and free from viruses and malware. They provide a free scan for all users, generates a report of all the errors found and then cleans up all the parasites detected. You can find out more and download it at the website link below.

Are you looking for Downloadable Virus Protection Software? VIRUS Don't do it yet, because the author has found many bad spyware and virus cleaning software on the web. Read the author's review of the Top 5 Spyware & Virus Removal Software on the market now at http://www.review-best.com/spyware-virus-removal-software.htm first!

Learn to completely get rid of all the spyware and viruses on your computer in less than 5 minutes with a FREE PC Scan!

Article Source: http://EzineArticles.com/?expert=Donald_Chambers

Learn How Web 3.0 Technologies Will Improve Interoperability Between Hardware and Software

With the roll out of Web 3.0, times are changing for software developers as well hardware vendors who are creating technologies that will improve, not only on search, but improve the lives of people who are using the Internet to find information that is relevant to their lives and lifestyles.

One thing to keep in mind as we move into 2009, even into 2010, is that some of the companies that are in the forefront of developing Web 3.0 technologies are actually in stealth mode.

We hear a lot about Web 3.0 but understanding the intricacies that are tied into the semantic search are kept under close guard - and for good reason. Word has it that there are going to be many new and exciting technologies linked in and tied to Web 3.0.

What's important to know is that Web 3.0 will still be built on content in all formats. And while there will be a lot of enhancements that are available with Web 3.0, it will to a certain extent, be an extension of Web 2.0.

The real big winners in the new Web 3.0 are going to be people who own original content. As the analytical tools that go into Web 3.0 look at and analyze data, they're going to extract robot-generated content. They're going to be able to dig deeper into people who are producing content, people who own their own products and services as well as content, and all formats will benefit greatly.

Isn't that the power of the Internet, of getting accurate, relevant information and doing search queries that pull up important content that makes sense for you and your family, and gives you an overall better learning experience on the Internet?

Michael G. Perry is the owner of Coprofit, a Las Vegas-based joint-venture company that helps small business owners and corporate clients improve their ROI when launching joint ventures.

Michael can be reached at sanket.jmdcomputer@gmail.com

Article Source: http://EzineArticles.com/?expert=Michael_G_Perry

6 Types of Microsoft Classes That Build Proficiency By Christine OKelly Platinum Quality Author

Learning to use any software package can be difficult without having the right level of guidance. Most programs that are developed today include more value than people realize. Tapping into that value in a manner that improves efficiency and productivity is all but impossible without the direction provided by an instructor within a classroom setting.

A lot of business professionals choose to learn applications by reading books. Others search for tutorials online. While both routes can be helpful, becoming proficient with a given software package involves intense focus. For example, most people won't need to know everything about Excel, Word, or Exchange. Instead, they need a disciplined approach that focuses upon the most important elements, given their goals. Below, I'll provide an overview of 6 types of Microsoft classes that can help you build the proficiency your job requires.

#1 - Excel

Whether you're creating formulas for advanced financial analysis or you need a simple spreadsheet in order to organize data, Excel is the first choice among most business professionals. From basic to advanced training, customized Microsoft classes can help you develop any level of expertise that you need in Excel.

#2 - Word

The most popular word processing program in the world is Word. It can be used for letters and other documents, of course. But, experienced users can also build tables, create web pages, and design forms. A classroom setting is an ideal environment to improve your skills and expand your aptitude with the program.

#3 - Exchange

Microsoft classes that help clients build their proficiency with Exchange can unlock the application's hidden value. A basic course can focus upon installation and configuration. An intermediate course can instruct clients regarding how to build and deploy messaging systems. Advanced courses might concentrate on migration and security protocols.

#4 - Access

Access is a powerful database application that IT and business professionals can use to collect, sort, and manage volumes of data. While non-programmers can use it to build simple databases, experienced users can leverage the software to do much more. Microsoft training courses can teach database basics, SQL queries, and importing and exporting objects.

#5 - Outlook

Outlook is one of the most popular email clients used today. However, those who have never attended Microsoft classes might be surprised to learn that it can do much more than merely handle email-related chores. Outlook can help you manage the personal information you need at your fingertips throughout the day. For example, you can use it to schedule meetings, look at associates' calendars, and manage your "to do" lists. Advanced Microsoft classes can teach you how to integrate RSS feeds, work with templates, and share folders with your peers.

#6 - PowerPoint

PowerPoint is the premier application employed to create presentations. Most businesses use it. While the program is comparatively simple to learn, there is a significant amount of usability that is hidden under the surface. By enrolling in Microsoft classes that are solely devoted to PowerPoint, you'll learn how to create slide shows, use animations, and even integrate it with Word templates.

Enrolling In Certified Courses

It is possible to become adept at using most types of software without the advantage of classroom guidance. However, a classroom setting is often the most efficient way to learn. The curriculum can be customized to fit the focus of your company. Rather than wasting time learning information and tips that are practically useless for your needs, Microsoft training in Chicago or in any other city can be designed with your specific goals in mind. As software continues to be developed with greater levels of functionality, learning with the help of an instructor may be the best way to unlock its value.

Christine O'Kelly writes informative articles for Directions Training, a certified provider of Microsoft training in Chicago. They specialize in all types of Microsoft classes. Chicago is home to this innovative, results-oriented firm, but they maintain campuses in several major cities.
Article Source: http://EzineArticles.com/?expert=Christine_OKelly

Creating and Deploying Active Directory Rights Management Services Rights Policy Templates Step-by-Step Guide

To ease administration of the rights policy templates, you can store AD RMS rights policy templates in a central location so that they can be copied to the AD RMS clients. Some distribution methods include using Systems Management Server, Group Policy, or manually copying the templates to the AD RMS client. In this guide, the rights policy templates are copied manually.

Note

The AD RMS service account must have Write access to the rights policy template shared folder in order for the rights policy template export function to work correctly.

To create a shared folder for the AD RMS rights policy templates and set appropriate permissions for the AD RMS service account, do the following:

To create an AD RMS rights policy templates shared folder

1. Log on to ADRMS-SRV as CPANDL\Administrator.

2. Click Start, click Computer, and then double-click Local Disk (C:).

3. Create a new folder named ADRMSTemplates. Click Organize, click New Folder, type the name ADRMSTemplates, and then press ENTER.

4. Right-click the ADRMSTemplates folders, and then click Properties.

5. Click the Sharing tab, and then click Advanced Sharing.

6. Select the Share this Folder check box, and then click Permissions.

7. Click Add, in the Enter the object names to select box type CPANDL\ADRMSSRVC, and then click OK.

8. In the Group or user names box, click ADRMSSRVC (ADRMSSRVC@cpandl.com), and then, in the Permissions for ADRMSSRVC box, select the Change check box in the Allow column.

9. Click OK twice.

10. Click the Security tab, and then click Edit.

11. Click Add, in the Enter the object names to select box type CPANDL\ADRMSSRVC, and then click OK.

12. Click ADRMSSRVC (ADRMSSRVC@cpandl.com), and then, in the Permissions forADRMSSRVC box, select the Modify check box in the Allow column, and then click OK.

13. Click Close.

As mentioned earlier in this guide, AD RMS rights policy templates are created on the AD RMS cluster and then exported to a shared folder. If your users will be using the AD RMS-enabled application only when connected to the internal network, the templates can be accessed from the shared folder by the clients as needed. In this case, all AD RMS users should have Read access to this shared folder in order for them to use the rights policy template.

Alternatively, the templates can be copied from the shared folder to the client computers. This enables the templates to be used when users are not connected to the network, such as when traveling with a laptop or from another mobile device. Because the most common deployment is to copy the templates to the client computers, this is the approach explained in this guide.

To create a new AD RMS rights policy template

1. Open the Active Directory Rights Management Services Administration console. Click Start, point to Administrative Tools, and then click Active Directory Rights Management Services.

2. In the Active Directory Rights Management Services Administration console, click LocalHost.

3. In the Tasks box in the Results pane, click Manage rights policy templates.

4. To enable exporting of the AD RMS rights policy templates, click Properties in the Actions pane.

5. Select the Enable export check box, type \\adrms-srv\ADRMSTemplates in the Specify templates file location (UNC) box, and then click OK.

6. In the Actions pane, click Create Distributed Rights Policy Template to start Create Distributed Rights Policy template wizard.

7. Click Add.

8. In the Language list, choose the appropriate language for the rights policy template.

9. Type CPANDL.COM CC in the Name box.

10. Type CPANDL.COM Company Confidential in the Description box, and then click Add.

11. Click Next.

12. Click Add, type employees@cpandl.com in The e-mail address of a user or group box, and then click OK.

13. Select the View check box to grant the EMPLOYEES@CPANDL.COM group Read access to any document created by using this AD RMS rights policy template.

14. Click Finish.

The AD RMS client is included in the default installation of Windows Vista. Previous versions of the client are available for download for other Windows operating systems.

This guide assumes that an AD RMS cluster is already configured in a test environment. Additionally, extra configuration is required on the AD RMS client workstation so that the rights policy templates are accessible. To make the AD RMS rights policy templates accessible, you must copy the AD RMS rights policy templates to the client computer and create a registry entry that points to the location of the rights policy templates.

In order for the AD RMS client computer to locate the templates, you must add a registry entry and copy the AD RMS rights policy templates locally. To do this, you must complete the following steps before rights-protecting a document:

To make AD RMS templates available to users on ADRMS-CLNT

1. Log on to ADRMS-CLNT as Nicole Holliday (nhollida@cpandl.com).

2. Click Start, type regedit.exe in the Start Search box, and then click the regedit.exe icon under Programs.

3. Expand the following registry key:

HKEY_CURRENT_USER\Software\Microsoft\Office\12.0\Common\DRM

Note

If DRM was not already created as a part of the key, you must create it manually.

4. Select DRM, click Edit, point to New, click Expandable String Value, and then type AdminTemplatePath.

5. Double-click the AdminTemplatePath registry value and type %UserProfile%\AppData\Microsoft\DRM\Templates in the Value data box where %UserProfile% equals C:\Users\, and then click OK.

6. Close Registry Editor.

7. Verify that the path C:\Users\nhollida\AppData\Microsoft\DRM\Templates\ is valid. If it is not, create the appropriate folders.

8. Click Start, type \\ADRMS-SRV\ADRMSTemplates in the Start Search box, and then press ENTER.

9. Copy the exported AD RMS rights policy templates from \\ADRMS-SRV\ADRMSTemplates to C:\Users\nhollida\AppData\Microsoft\DRM\Templates.

Note

Copying the AD RMS rights policy templates to the client computer is not required if the rights policy templates do not have to be available offline.

To verify the functionality of the AD RMS deployment, you log on as Nicole Holliday and then restrict permissions on a Microsoft Word 2007 document by using the AD RMS rights policy template created earlier in this guide. This policy gives CP&L employees the ability to read the document but not to change, print, or copy. All other people have no access at all to the document. You then log on as Stuart Railson and verify that Stuart Railson, a member of the Employees group at CP&L, cannot print the document.

To restrict permissions on a Microsoft Word 2007 document

1. Log on to ADRMS-CLNT as Nicole Holliday (nhollida@cpandl.com).

2. Click Start, click All Programs, click Microsoft Office, and then click Microsoft Office Word 2007.

3. Type CP&L Employees cannot print this document on the blank document page, click the Microsoft Office button, point to Finish, point to Restrict Permission, click Restrict Permission as, select nhollida@cpandl.com in the Select User dialog box, and then click OK.

4. In the Permission dialog box, select the Restrict permission to this document check box, click Read, type the name of the user or group to be restricted. In this case, type employees@cpandl.com, and then click OK twice.

5. Click the Microsoft Office button, click Save As, and then save the file as \\ADRMS-DB\public\ADRMS-TST.docx.

6. Log off as Nicole Holliday.

Next, log on as Stuart Railson and open the document, ADRMS-TST.docx.

To view a protected document

1. Log on as Stuart Railson (srailson@cpandl.com).

2. Click Start, point to All Programs, point to Microsoft Office, and then click Microsoft Office Word 2007.

3. Click the Microsoft Office button, click Open, navigate to \\ADRMS-DB\public, and then double-click ADRMS-TST.docx.

The following message appears: "Permission to this document is currently restricted. Microsoft Office must connect to https://adrms-srv.cpandl.com/_wmcs/licensing to verify your credentials and download your permission."

4. Click OK.

The following message appears: "Verifying your credentials for opening content with restricted permissions…"

5. When the document opens, click the Microsoft Office button. Notice that the Print option is not available.

6. Click View Permission in the message bar. You should see that AD RMS rights policy template has been applied to this document.

7. Click OK to close the My Permissions dialog box, and then close Microsoft Word.

You have successfully deployed and demonstrated the rights templates policy feature of AD RMS, using the simple scenario of applying a rights policy template to a Microsoft Word 2007 document. You can also use this deployment to explore some of the additional capabilities of AD RMS through additional configuration and testing.

 
Design and Bloggerized by JMD Computer