This article by Gennadiy Zlobin, the author of the book Learning Python Design Patterns, describes what the model, view, and controller are, how to use them together, and their benefits.Read Exploring Model View Controller in full
This article by David J. Parker, the author of the book Microsoft Visio 2013 Business Process Diagramming and Validation, introduces Microsoft Visio and the features that support process management; further it explores the built-in templates with validation rules.Read Overview of Process Management in Microsoft Visio 2013 in full
In this article by Martin Spasovski, author of OAuth 2.0 Identity and Access Management Patterns, we'll learn about the security features that the OAuth 2.0 provides, and which security considerations we can take into account in order to build more secure applications.Read Security considerations in full
This article has been created by Vijay Parthasarathy, the author of Learning Cassandra for Administrators. The Apache Cassandra database is a linearly scalable and highly available distributed data store which doesn't compromise on performance and runs on commodity hardware. Cassandra's support for replicating across multiple datacenters / multiple discrete environments is the best in the industry. Cassandra provides high throughput with low latency without any single point of failure on commodity hardware.
Cassandra was inspired by the two papers published by Google (BigTable) in 2006 and Amazon (Dynamo) in 2007, after which Cassandra added more features. Cassandra is different from most of the NoSQL solutions in a lot of ways: the core assumption of most of the distributed NoSQL solutions is that Mean Time Between Failures (MTBF) of the whole system becomes negligible when the failures of individual nodes are independent, thus resulting in a highly reliable system.
Read Basic Concepts and Architecture of Cassandra in full
This article written by Simon Buxton, the author of Microsoft Dynamics AX 2012 R2 Administration Cookbook discusses about the framework provided by e-mails and batch processing and which is used by many end user functions and other frameworks, for example, a workﬂow cannot function without these being set up correctly.Read Setting Up and Managing E-mails and Batch Processing in full
In this article by Sandro Pasquali, the author of the book Mastering Node.js, we are going to learn how streams of I/O data are knitted through most network software, emitted by file servers or broadcast in response to an HTTP GET request.Read Exploring streams in full
In this article by Eugene Agafonov, the author of the book "Multithreading in C# 5.0 Cookbook", the author has reviewed the common problems that a programmer often faces while trying to implement parallel work flow. You will learn about:Read Parallel Programming Patterns in full
In this article by Vignesh Prajapati, author of the book Big Data Analytics with R and Hadoop, we learn about Data analytics project life cycle by demonstrating with real-world Data analytics problems.Read Learning Data Analytics with R and Hadoop in full
In this article by Jonathan Lermitage, the author of the book, Instant JRebel, we'll see how to work with JRebel on the Ant Java SE projects: a simple graphical application will be built and modified without any additional compilation, thanks to the JRebel live code injection. You will also get some words about Maven Java SE projects support. NetBeans will be used as the main IDE.Read Working with Java SE projects (Should know) in full
In this article by Wu Zhangjin and Cao Ziqiang, authors of the book Instant Optimizing Embedded Systems Using BusyBox, we learn about using BusyBox.Read Instant Optimizing Embedded Systems Using BusyBox in full
In this article by João P. Soares Fernandes, the author of Moodle 2.5 Multimedia, we will focus essentially on web-based applications for creating multimedia.Read Understanding Web-based Applications and Other Multimedia Forms in full
This article written by Harshul Patel, the author of the book Instant Windows PowerShell Guide, describes what needs to be done rather than covering imperative syntax and specifies how a task can be performed.Read Executing Desired State Configuration (Advanced) in full