In this article by Ahmed Lashin and Abhishek Sanghani, authors of the book IBM Cognos 10 Report Studio Cookbook Second Edition, talks about the basic concepts of authoring reports in IBM Cognos Report Studio.
In this article, we will cover the following:
- Summary filters and detail filters
- Sorting grouped values
- Aggregation and rollup aggregation
- Implementing if-then-else in filters
- Formatting data – dates, numbers, and percentages
- Creating sections
- Hiding columns in crosstabs
- Prompts – display value versus use value
In this article by Nishanth Nair and Ragini Kumbhat Bhandari, authors of the book, Building Mobile Application Using Kendo UI Moble and ASP.NET Web API, we will start exploring Kendo Mobile widgets from the basics and in detail with examples. These widgets are tailored for touch-based mobile devices and provide platform-specific rendering with a native look and feel.Read Kendo UI Mobile – Exploring Mobile Widgets in full
In this article by Daniel Langenhan author of the book VMware View Security Essentials, we will cover the following topics in this section:
- Basic of the network
- Network pools
- Types of vCloud network
- IP management
In this article created by lnnes Borkwood, the author of Learning Stencyl 3.x Game Development Beginner's Guide
The gameplay mechanics are in place, we've added some nice visual effects, and our game is starting to look great, but there is still an important element missing; players of our game have no indication of how they are progressing. We need to let our players know how well (or badly) they are doing, otherwise there will be no incentive for them to continue playing the game!
There are many different pieces of information that might be useful to a player during gameplay, but we need to be careful not to overwhelm them, otherwise they'll be distracted from the game. Currently, we are keeping track of the time that is available for the player to complete the task of collecting all the fruit, but we're also going to be adding a count of the lives that the player has left.
In order to present this information to the player, we need to display it on the screen, but we're not only going to implement text messages for our players to read — we're also going to introduce a graphical method of displaying some of the information.
The last piece of information that we will need to work with is how many pieces of fruit have been collected; we need to know when players of our game have successfully completed a level!Read Managing and Displaying Information in full
In this article, created by Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, and Jaya Nampalli, the authors of Mobile Security: How to Secure, Privatize, and Recover Your Devices, we will take an in-depth look at various scams, phishing, spear phishing, social engineering, Cloud security, viruses, worms, and other threats a user may encounter, and future threats.
In this article, we will review various threats that you need to be aware of. They are as follows:
- SMS spoofing
- Social engineering
- Cloud computing
In this article, by Sherif Talaat and Haijun Fu authors of PowerShell 3.0 Advanced Administration Handbook, we will see Microsoft Windows Azure and SQL Azure as a real-life example of a cloud computing implementation, and we will learn how Windows PowerShell plays a major role in operating such a technology easily, as if managing a normal virtualized environment.Read Managing Microsoft Cloud in full
This article by Aurelio De Rosa the author of Instant JQuery Selectors, describes how many and what are the selectors to collect elements by their attributes.
In this article, we'll see how to select elements by their attributes paying attention to some quirks that can lead to an unexpected behavior.Read Selecting by attributes (Should know) in full