Apache Hadoop is the trademark of Apache Software Foundation (http:// hadoop.apache.org/). HDInsight is Microsoft's Apache Hadoop-based solution for Windows server and Windows Azure. This article, created by Rajesh Nadipalli author of the book, HDInsight Essentials, will provide an overview of Apache Hadoop and Microsoft Big Data strategy where Microsoft HDInsight plays an important role.Read Hadoop and HDInsight in a Heartbeat in full
This article by Abdullah Al Mohammad, the author of the book Ext JS 4 Plugin and Extension Development, introduces and defines the Ext JS plugins and extensions, the differences between them, and finally shows how to develop a plugin and an extension.
In this article we will cover:
- What a plugin is
- What an extension is
- Differences between an extension and a plugin, and choosing the best option
- Building an Ext JS plugin
- Building an Ext JS extension
In this article by Evgeniy Sharapov, author of the book Instant Apache Camel Messaging System, we will learn about testing a Camel application. Of course, it is very easy to start your application and see how it works while it is small. Once the application starts growing, it will become impossible to check that it works correctly. Furthermore, Camel is both concurrent, which makes it even more complex, and an integration framework, so one would expect inputs and outputs to come and go from and to other systems, which might make things very tedious for the person doing quality assurance. Well, a long time ago, software developers came up with an idea to automate testing. Since then, plenty of good frameworks and libraries facilitating automatic testing have emerged. One of the approaches is unit testing—testing an application's functionality piece by piece or unit by unit. In the Java world, there are two options for unit testing: JUnit and TestNG. Even though Apache Camel supports both, here we will use only JUnit.Read Testing a Camel application in full
Microsoft Dynamics GP 2013 is a sophisticated Enterprise Resource Planning system used throughout the world. Implementing Dynamics GP for an organization can be a daunting task, requiring thorough planning and understanding of the available features and options. This article provides guidance for the planning, installation, and setup of Microsoft Dynamics GP 2013 with examples, advice, step-by-step guides, illustrations, and links to useful resources.
Most likely, you have already started training users. For many companies training is an ongoing process. In this article by Victoria Yudin, the author of Microsoft Dynamics GP 2013 Implementation, you will go over some ideas for planning your initial, as well as ongoing, training. We will also discuss tools available from Microsoft for your Dynamics GP system. Finally, some troubleshooting tips and additional resources will be listed to help you maintain and get the most out of Dynamics GP.Read Training, Tools, and Next Steps in full
This article by Shea Silverman, author of Instant Raspberry Pi Gaming, will describe how to install MAME4All through the Raspberry Pi Store. It will also explain how to run it from both the GUI and the CLI, and how to add games.Read Installing MAME4All (Intermediate) in full
Phones are everywhere! From calling to texting, you use phones for your business and for personal use. Twilio provides an API that lets you combine phone calls and SMS messages with your websites. In this article by Roger Stringer, the author of Twilio Cookbook we will cover two recipes which will help us to learn how to send message and make phone from your website with the help of Twilio.Read Make phone calls, send SMS from your website using Twilio in full
In this article by Joseph Muniz and Aamir Lakhani, the authors of the book Web Penetration Testing with Kali Linux, web Penetration Testing is described in brief. Many organizations offer security services and use terms such as security audit, network or risk assessment, and Penetration Test with overlapping meanings. By definition, an audit is a measurable technical assessment of a system(s) or application(s). Security assessments are evaluations of risk, meaning services used to identify vulnerabilities in systems, applications, and processes.Read Penetration Testing and Setup in full
In this article by Daniel Li, author of the book Instant Brainshark, we'll be looking at how to take full advantage of Brainshark's narrated slideshow functionality by following best practices in the presentation design. This will be covered using a list of tips, followed by why these best practices are followed in industry. Lastly, we will look into ways to aesthetically improve existing and future presentations.Read Increasing sales with Brainshark slideshows/documents in full
This article written by Mark Aberdour, the author of Moodle for Mobile Learning, aims to provide you with a vision of how Moodle for mobile learning can be put to use in your own organization. It will give you an understanding of the foundations of mobile learning, some insights into how important mobile learning is becoming, and how it is gaining momentum in different sectors. At the end of this article, you should have an understanding of the key concepts of mobile learning so that you can apply these concepts in order to enhance your own Moodle courses. We want to set you off on a mobile learning path that will allow you to better meet the needs and expectations of your learners who, as we will see, already use mobile devices as the backbone of their daily online interactions, and expect mobile compatibility to be the norm.
In this article, we will look at the following:
- Background to mobile learning
- Background to mobile devices
- The 4 Cs of mobile learning
- Your mobile learning strategy
- Understanding your learners and how they use their devices
- Mobile usage in industry
In this article by Peter A. Pilgrim, author of the book Java EE 7 Developer Handbook, we will cover the Java API for RESTful services otherwise abbreviated to JAX-RS. It was the year, 2000, when Roy Fielding published his PhD thesis entitled Representational State Transfer: an Architecture Style. Since its publication over the past decade there has been a rapid growth of interest, applications, and implementations of REST style interfaces and application.Read RESTful Services JAX-RS 2.0 in full
This article by Geoff Chiang the author of Instant Spring Tool Suite is aiming to get you up and running developing with various Spring technologies, providing you with enough to give you a head start in Spring development.
The term web service is a nebulous one, encompassing a range of both technologies and approaches. At its heart, a web service is simply a software service which is accessible over a network, designed for machine-to-machine interaction. Early web services were based on the W3C WS-* set of standards, with interfaces described using WSDL and interaction using SOAP messages. This approach seems to have fallen out of favor somewhat, with lightweight RESTful approaches now prevalent.
In this recipe, we're going to retrieve weather data from the Australian Bureau of Meteorology. This service exposes Australian weather data in JSON format. As we're about to see, STS and Spring Integration allow us to interact with web services with very little effort.Read Connecting to a web service (Should know) in full
In this article, by Sven Vermeulen, the author of SELinux System Administration, has explained how to manage user logins. When we log in to an SELinux enabled system, we are assigned with a default context to work in. This context contains a SELinux user part, a SELinux role, a domain, and optionally a sensitivity range.
In this article, we will define users that have sufficient rights to do their jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection.Read Managing User Logins in full
In this article by George Siogkas, author of the book, Visual Media Processing Using MATLAB Beginner's Guide, we will dig a little deeper into the image filtering theory and use some more complicated techniques to enhance our images. All the methods we will present, will once more be accompanied by hands-on examples that demonstrate their significance in both typical and more advanced image processing tasks.
In this article, we shall learn:
- The basic theory on image filtering and processing pixel neighborhoods
- How we can filter an image using convolution
- Alternative ways to filter an image
- Creating image filters in MATLAB
- Using filters for image blurring
So, let's get started!Read 2-Dimensional Image Filtering in full
This article by Jim Wilson, author of Creating Dynamic UI with Android Fragments, shows how to use fragments to meet the challenges of creating dynamic UIs in the modern world of mobile app development.Read Creating Dynamic UI with Android Fragments in full