Article Network

All | June | May | April

Using Redis in a hostile environment (Advanced)

by Matt Palmer | December 2013 | Open Source

In this article by Matt Palmer, author of Instant Redis Persistence, we'll step through a number of different scenarios, and how you can go about protecting against each one.

While securing your data isn't strictly a persistence topic, it is an important one to consider when planning your data storage strategy. If your stored data can be accessed improperly, you're in a whole world of pain.

A common complaint about Redis is that it has no means of controlling who has access to the Redis server—if you can connect to the Redis server, you've got the ability to fully access and manipulate the data stored in that server.

Read Using Redis in a hostile environment (Advanced) in full

Implementing the Naïve Bayes classifier in Mahout

by Piero Giacomelli | December 2013 | Cookbooks Open Source

In this article written by Piero Giacomelli, the author of the book Apache Mahout Cookbook, we will implement the Naïve Bayes classifier for creating clusters and aggregating unstructured information in a manageable way.

We will cover the following recipes in this article:

  • Using the Mahout text classifier to demonstrate the basic use case
  • Using the Naïve Bayes classifier from code
  • Using Complementary Naïve Bayes from the command line
  • Coding the Complementary Naïve Bayes classifier
Read Implementing the Naïve Bayes classifier in Mahout in full

Acting as a proxy (HttpProxyModule)

by Usama Dar | December 2013 | Open Source

This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.

 

Read Acting as a proxy (HttpProxyModule) in full

Creating Identity and Resource Pools

by Farhan Ahmed Nadeem Prasenjit Sarkar | December 2013 | Architecture & Analysis Enterprise Articles Networking & Telephony

This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.

The list of topics that will be covered in the article is as follows:

  • Understanding identity and resource pools
  • Learning to create a UUID pool
  • Learning to create a MAC pool
  • Learning to create a WWNN pool
  • Learning to create a WWPN pool
  • Understanding the server pool
  • Learning to create server pool membership and qualification policies
Read Creating Identity and Resource Pools in full

Adding Raster Layers

by Alper Dincer Balkan Uraz | December 2013 | Web Development

In this article by Alper Dincer and Balkan Uraz, the authors of the book Google Maps JavaScript API Cookbook, we will cover:

  • Styling of Google base maps
Read Adding Raster Layers in full

Microsoft DAC 2012

by Jochen Nickel | December 2013 | Enterprise Articles

In this article by Jochen Nickel, author of Learning Microsoft Windows Server 2012 Dynamic Access Control, we will have a look at the Microsoft DAC 2012, which is an end-to-end file server solution. We will have a look at the main components of Dynamic Access Control (DAC) for better granular overview.

Read Microsoft DAC 2012 in full

Using Faceted Search, from Searching to Finding

by Alfredo Serafini | December 2013 | Beginner's Guides Open Source

In this article, Alfredo Serafini, the author of Apache Solr Beginner's Guide, covers how to perform a faceted search.

Read Using Faceted Search, from Searching to Finding in full

Creating the ice and snow materials

by Bernardo Iraci | December 2013 | Cookbooks Games Open Source

In this article by Bernardo Iraci, author of the book Blender Cycles: Lighting and Rendering Cookbook, we are going to create all the material for an iceberg. Our target is to have snow on the flat surfaces and ice on the slopes, where it is too steep for the snow to stay. Let's get started!

Read Creating the ice and snow materials in full

Handling the DOM in Dart

by Dzenan Ridjanovic Ivo Balbaert | December 2013 | Web Development

This article is written by Ivo Balbaert and Dzenan Ridjanovic, the authors of the book Learning Dart.

Read Handling the DOM in Dart in full

Creating a Direct2D game window class

by Michael Fontanini | December 2013 | Games Open Source

This article written by Michael Fontanini, the author of the book Game Development with SlimDX, focuses on drawing 2D graphics using Direct2D.

Read Creating a Direct2D game window class in full

Social Engineering Attacks

by Rahul Singh Patel | December 2013 | Open Source Web Development

This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).

Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.

Read Social Engineering Attacks in full

Getting Started with Fusion Applications

by Faisal Ghadially Kalpit Parikh | December 2013 | Enterprise Articles Oracle

This article by Faisal Ghadially and Kalpit Parikh, the authors of Oracle Fusion Applications Administration Essentials, provides an architectural overview and an introduction to the technical components of Oracle Fusion Applications.

Read Getting Started with Fusion Applications in full

Planning a character's look

by Igor Uduslivii | December 2013 | Games Open Source

In this article by Igor Uduslivii author of iPhone Game Blueprints we will design how a game character will appear. Game worlds have become larger and give players plenty more adventure experiences. The heightened pictorial look of the characters increases players' empathy toward their avatars, generating greater feelings of exciting.

Read Planning a character's look in full

GLSL – How to Set up the Shaders from the Host Application Side

by Jacobo Rodríguez | December 2013 | Open Source

In this article written by Jacobo Rodríguez, the author of the book GLSL Essentials, we will learn how to set up the shaders from the host application side.

OpenGL 4.3 is a C language API that bases its design in encapsulating objects in opaque handles that represents abstract concepts (from the user's point of view) such as textures, shaders, vertex buffers, and so on. In order to render something using OpenGL, we have to create those objects, associate our data to them, and issue the required OpenGL commands to set them as active, and in the last term, launch the draw call.

Let's define an important computer graphics concept: a rendering batch. A rendering batch is the geometry set that will be rendered along with the textures, OpenGL's states and shaders. Once we have all that data ready, we can issue the drawing command to the GPU, and hopefully (if we did everything correctly) watch the rendering in our screen.

The order of the creation of the different OpenGL objects is not relevant. You can first create the vertex buffer or the shaders, or first the textures and then the shaders. I will use the following order just for teaching purposes:

  1. Vertex array objects
  2. Textures
  3. Shaders

Then, I will put all together and render the batch.

Read GLSL – How to Set up the Shaders from the Host Application Side in full

Working with Tooltips

by Alex Libby | December 2013 | Open Source Web Development

In this article by Alex Libby, the author of jQuery UI 1.10: The User Interface Library for jQuery, we will looked at how, with just a little underlying HTML and a single line of jQuery-flavored JavaScript, we can implement the default tooltip widget.

Introduced as a part of the HTML 3 standard, and using the title attribute as its text, tooltips are a common element used to provide context within a page. You could find them in use in a variety of situations, although it is most likely that they will be found when providing assistance in correcting errors as part of the submission of a form (particularly when it concerns payment for products!).

Read Working with Tooltips in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software