In this article by Sébastien Armand, the author of the book Extending Symfony2 Web Application Framework, has discussed about the basics of services in the Symfony2 framework. A service is an essential and core concept in Symfony2. In fact, most of the framework itself is just a big set of predefined services that are ready to use. As an example, if you just set up a new installation of Symfony2, from your project root, you can type php app/console container:debug to see the full list of services currently defined in your application. As you can see, even before we start writing anything for our application, we already have almost 200 services defined. The php app/console container:debug <service_name> command will provide information about a specific service and will be a useful command to refer to throughout the article.Read Services in full
In this article by Rebecca Fitzhugh, the author of the book vSphere Virtual Machine Management, has explained the basic concepts of the virtual machine. Ever since VMware was founded in 1998, it has been creating stable x86 virtualization platforms that allow multiple guest operating systems and applications to run on a single physical server. Before an administrator can begin creating and configuring vSphere virtual machines, it is important to understand what a virtual machine is and the concepts behind virtualizing hardware.
In this article, you will learn:
- What a virtual machine is
- Components of a virtual machine
- Why to use virtual machines
- Files that make up a virtual machine
- The four primary resources
- VMware Tools
This article written by Martin Bergljung, the author of Alfresco CMIS, describes Content Management Interoperability Services (CMIS), which is an interface that provides a standard way to access a Content Management System (CMS). This article introduces the CMIS standard and it explains why CMIS is important.Read Getting Started with CMIS in full
In this article by Wojciech Kocjan, author of the book Learning Nagios 4, we will learn some guidelines that will help you migrate from small (and increasing) Nagios setups to a flexible model by using templates and grouping effectively. Any experienced administrator knows that there is a huge difference between a working system and a properly configured system. Using this advice will help you and your team survive the switch from monitoring only critical services to checking the health of the majority of your IT infrastructure.Read Advanced Configuration in full
In this article by Nathan Danneman and Richard Heimann, the authors of Social Media Mining with R, introduces readers to the concept of social media mining. This article discusses sentiment analysis, the nature of contemporary online communication, and the facets of Big Data that allow social media mining to be such a powerful tool.Read Going Viral in full
This article is by Jürgen Brunner, the author of the book Getting Started with Clickteam Fusion. Game development is not all about turning cool ideas into games. You will also face a big non game-related technical part and a preproduction phase behind every game. Deciding on a resolution and the right interface for your game will be part of this book. You will also learn some basic enemy behavior.Read Introducing a new game type – top-down in full
In this article by Michael Larkin, author of VMware Horizon Workspace Essentials, we will cover the basic installation and configuration of Horizon Workspace 1.5. After making sure all the prerequisites are in place, we can now deploy the Horizon Workspace vApp.Read Design, Install, and Configure in full
This article by Fernando Carbone, the author of the book Computer Forensics with FTK, will cover how to use the most important features for processing and filtering data during an investigation process.
The processing step is considered to be the most important step because the correct utilization of its functionality can be decisive in the relevant results of an investigation.
You will understand the importance of the correct use of the Time Zone feature and how this impacts the properties of the files, and learn how to use filters and searches. Finally, you will be able to generate a report of your findings.Read Processing the Case in full
Given the frequency of debugging, any refinement to the tools used can pay immediate dividends. In this article by Jeff Martin, the author of the book Visual Studio 2013 Cookbook, he explains the popular Edit and Continue feature that now supports working with 64-bit code. Added to that is the new ability to see the return value of functions in your debugger. These two features combine to make debugging code easier, allowing you to solve problems faster.Read Maximizing everyday debugging in full
Twitter Bootstrap is an excellent CSS framework that provides many carefully crafted user interface elements, layouts, and jQuery plugins. Bootstrap is open source and is also one of the most popular projects of all time on GitHub. We will explore Bootstrap in this article by Christoffer Niska, author of Extending Bootstrap.Read Getting Started with Bootstrap in full
This article is written by Tedi Heriyanto, Lee Allen, and Shakeel Ali, the authors of Kali Linux – Assuring Security by Penetration Testing. Target exploitation is one area that sets a penetration test apart from a vulnerability assessment. Now that vulnerabilities have been found, you will actually validate and take advantage of these vulnerabilities by exploiting the system in the hope of gaining full control or additional information and visibility into the targeted network and the systems therein. This article will highlight and discuss practices and tools that are used to conduct a real-world exploitation.Read Target Exploitation in full
Our knowledgebase plugin adds extra content to Redmine projects in the form of categories and articles. These new content areas may contain sensitive information, which we would want to restrict certain users from accessing.
As there are different levels of users in Redmine for issue reporting and management, it is only natural that we would want to restrict access to the content in our knowledgebase plugin in a similar fashion.
In this article, written by Alex Bevilacqua the author of Redmine Plugin Extension and Development, you will be introduced to Redmine's permission system. You will learn how you can take advantage of it to restrict access to content areas within our plugin.
We will cover the following topics in this article:
- Summarizing Redmine's permissions system
- Declaring custom permissions
- Ensuring access restrictions in models, views, and controllers
- Understanding custom content access control
In this article by Nicholas Terwood, the author of Highcharts Cookbook, there exists a wide variety of different tools and frameworks spanning different languages and paradigms, and this list of tools continues to grow and expand. This article examines a few of the more popular tools and gives us some idea on how to integrate these different tools with highcharts.
In this article, we will cover:
- Using NodeJS as a data provider
- Using Django as a data provider
- Using Flask / Bottle as a data provider
- Integrating with Backbone
- Using AngularJS data-bindings and controllers
In this article by Daniel Bartholomew, the author of the book MariaDB Cookbook, has discussed about the SHOW EXPLAIN feature of MariaDB. The SHOW EXPLAIN feature was introduced in MariaDB 10.0. It enables us to get an EXPLAIN (that is, a description of the query plan) of the query running in a given thread.Read Using SHOW EXPLAIN with running queries in full