This article is written by Jesin A the author of Packet Tracer Network Simulator. Cisco Packet Tracer is a powerful network simulation program and provides simulation, visualization, authoring, assessment, and shows collaboration capabilities of a network. This article explains the IPv6 addresses used in Packet Tracer.
IPv4 has 4.3 billion addresses, which may seem mindboggling. However, it took only two decades for it to reach its depletion. IPv6 has come to the rescue in the form of 128-bit addresses. Packet Tracer supports a wide array of IPv6 features. We'll start by learning how to assign IP addresses to different devices and how to configure routing between them. Finally, we'll create a setup that enables IPv6 communication over IPv4 devices.Read IPv6 on Packet Tracer in full
In this article by Geoff Webber-Cross, author of the book Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8, we will have a look at how push Notifications allow us to expand our application's user experience outside the bounds of the app with live tile updates, toast notifications, and badges in Windows 8. Windows Azure Mobile Services makes it very easy for us to trigger notifications via Windows Notifications Service (WNS) (for Store apps), Microsoft Push Notification Service (MPNS) (for Windows Phone 8 apps), Apple Notifications Service (ANS), and Google Notifications Service (GCM). We're going to discuss how to configure Windows 8 and Windows Phone applications to allow notifications, send different types of notifications using scripts, and create a list of devices to manage our user's notification channels.Read Windows Azure Mobile Services - Implementing Push Notifications using in full
This article by Ryan Henson Creighton, author of Unity 3D Game Development by Example,introduces you to Unity 3D—an amazing game engine that enables you to create games and deploy them to a number of different devices, including (at the time of writing) the Web, PCs, iOS platforms, and WiiWare, with modules for Android and Xbox Live Arcade deployment in the works. You'll play a number of browser-based Unity 3D games to get a sense of what the engine can handle, from a massively-multiplayer online game all the way down to a simple kart racer. You'll download and install your own copy of Unity 3D, and mess around with the beautiful Island Demo that ships with the product.
Technology is a tool. It helps us accomplish amazing things, hopefully more quickly and more easily and more amazingly than if we hadn't used the tool. Before we had newfangled steam-powered hammering machines, we had hammers. And before we had hammers, we had the painful process of smacking a nail into a board with our bare hands. Technology is all about making our lives better and easier. And less painful.Read That's One Fancy Hammer! in full
This article, by Jaynal Abedin, the author of the book Data Manipulation with R, highlights the features such as factor variables, the split-apply-combine strategy, and reshaping a dataset in R.Read Aspects of Data Manipulation in R in full
This article, by Robert Kent, the author of Magento Search Engine Optimization, covers the basic concepts of keyword placement and the roles of the different types of pages to prepare and configure your Magento website.
In this article, we cover the following topics:
- Understanding the structure of a website, the purpose of optimizing for e-commerce, and the relationship between keywords and their position on a website
- Understanding the buying intent of our visitors and how this intent may differ depending on the type of page by which they enter our website
- The roles of content management system (CMS) pages
The article by Mark Reynolds, the author of Xamarin Mobile Application Development for Android, deals with one of the most interesting aspects for mobile development is interacting with device capabilities such as motion sensors, cameras, and location sensors. While these capabilities are new and fun to many developers, they can also bring a great deal of value to the users of our mobile apps.Read Making POIApp Location Aware in full
This article by Sherif Talaat, the author of Windows PowerShell 4.0 for .NET Developers, demonstrates both simple and advanced examples of how to make use of PowerShell integration with technologies such as .NET, WMI, CIM, and COM.
In this article, we will cover the following topics:
- The basics of WMI, CIM, COM, and XML
- Extending Windows PowerShell capabilities with .NET, COM, and XML
This article by Gastón Festari, the author of Learning Shell Scripting with Zsh, will teach to apply specific constructs such as the double bang (!!) to the shell's history and avoid repeating yourself to boredom.Read Time Saving Features of Zsh in full
In this article by Raymundo Armendariz and Arturo Soto, author of Getting Started with Backbone Marionette, we will learn the view types that Marionette has and how to use them.
Las tecnologías de Inteligencia de Negocios son parte fundamental de un negocio ya que apoyan el proceso de toma de decisiones con información clave y permiten a las empresas mantenerse alineados con la constante evolución de los mercados. La tecnología disruptiva de QlikView hace de éste un líder en la industria; con su flexibilidad y plataforma de análisis altamente poderosa, la construcción de aplicaciones QlikView está al alcance tanto de usuarios de negocio como de desarrolladores.
En este artículo por Miguel Ángel García y Barry Harmsen, autores de QlikView 11 para Desarrolladores, veremos:
- Qué es QlikView.
- Cómo explorar datos con QlikView.
- La tecnología y componentes detrás de QlikView.
- Aerolíneas HighCloud, y porqué QlikView puede ser justo la herramienta que necesitan.
This article by Gustavo De La Vega Alvarez, the author of Instant PhoneGap, has discussed how to implement geolocation in our app, we will use the API that PhoneGap provides us as part of a bunch of methods to use through our app. To build this, we need to create a JS file called myplaces.js. Create the file once using a text editor program such as Sublime Text or Notepad. Then we will perform the following steps:Read Geolocation – using PhoneGap features to improve an app's functionality, write once use everywhere in full
In this article by Matt Palmer, author of Instant Redis Persistence, we'll step through a number of different scenarios, and how you can go about protecting against each one.
While securing your data isn't strictly a persistence topic, it is an important one to consider when planning your data storage strategy. If your stored data can be accessed improperly, you're in a whole world of pain.
A common complaint about Redis is that it has no means of controlling who has access to the Redis server—if you can connect to the Redis server, you've got the ability to fully access and manipulate the data stored in that server.Read Using Redis in a hostile environment (Advanced) in full
In this article written by Piero Giacomelli, the author of the book Apache Mahout Cookbook, we will implement the Naïve Bayes classifier for creating clusters and aggregating unstructured information in a manageable way.
We will cover the following recipes in this article:
- Using the Mahout text classifier to demonstrate the basic use case
- Using the Naïve Bayes classifier from code
- Using Complementary Naïve Bayes from the command line
- Coding the Complementary Naïve Bayes classifier
In this article by Jochen Nickel, author of Learning Microsoft Windows Server 2012 Dynamic Access Control, we will have a look at the Microsoft DAC 2012, which is an end-to-end file server solution. We will have a look at the main components of Dynamic Access Control (DAC) for better granular overview.Read Microsoft DAC 2012 in full