Article Network

Training, Tools, and Next Steps

by Victoria Yudin | September 2013 | Enterprise Articles

Microsoft Dynamics GP 2013 is a sophisticated Enterprise Resource Planning system used throughout the world. Implementing Dynamics GP for an organization can be a daunting task, requiring thorough planning and understanding of the available features and options. This article provides guidance for the planning, installation, and setup of Microsoft Dynamics GP 2013 with examples, advice, step-by-step guides, illustrations, and links to useful resources.

Most likely, you have already started training users. For many companies training is an ongoing process. In this article by Victoria Yudin, the author of Microsoft Dynamics GP 2013 Implementation, you will go over some ideas for planning your initial, as well as ongoing, training. We will also discuss tools available from Microsoft for your Dynamics GP system. Finally, some troubleshooting tips and additional resources will be listed to help you maintain and get the most out of Dynamics GP.

Read Training, Tools, and Next Steps in full

Installing MAME4All (Intermediate)

by Shea Silverman | September 2013 | Games Open Source

This article by Shea Silverman, author of Instant Raspberry Pi Gaming, will describe how to install MAME4All through the Raspberry Pi Store. It will also explain how to run it from both the GUI and the CLI, and how to add games.

Read Installing MAME4All (Intermediate) in full

Make phone calls, send SMS from your website using Twilio

by Roger Stringer | September 2013 | Cookbooks Networking & Telephony

Phones are everywhere! From calling to texting, you use phones for your business and for personal use. Twilio provides an API that lets you combine phone calls and SMS messages with your websites. In this article by Roger Stringer, the author of Twilio Cookbook we will cover two recipes which will help us to learn how to send message and make phone from your website with the help of Twilio.

Read Make phone calls, send SMS from your website using Twilio in full

Penetration Testing and Setup

by Aamir Lakhani Joseph Muniz | September 2013 | Networking & Telephony Open Source

In this article by Joseph Muniz and Aamir Lakhani, the authors of the book Web Penetration Testing with Kali Linux, web Penetration Testing is described in brief. Many organizations offer security services and use terms such as security audit, network or risk assessment, and Penetration Test with overlapping meanings. By definition, an audit is a measurable technical assessment of a system(s) or application(s). Security assessments are evaluations of risk, meaning services used to identify vulnerabilities in systems, applications, and processes.

Read Penetration Testing and Setup in full

Managing content (Must know)

by Jason T. Bedell | September 2013 | Open Source

In this article written by Jason T. Bedell, the author of the book Instant Edublogs, provides details about managing different types of content.

Read Managing content (Must know) in full

Increasing sales with Brainshark slideshows/documents

by Daniel Li | September 2013 | e-Commerce

In this article by Daniel Li, author of the book Instant Brainshark, we'll be looking at how to take full advantage of Brainshark's narrated slideshow functionality by following best practices in the presentation design. This will be covered using a list of tips, followed by why these best practices are followed in industry. Lastly, we will look into ways to aesthetically improve existing and future presentations.

Read Increasing sales with Brainshark slideshows/documents in full

Developing Your Mobile Learning Strategy

by Mark Aberdour | September 2013 | Open Source

This article written by Mark Aberdour, the author of Moodle for Mobile Learning, aims to provide you with a vision of how Moodle for mobile learning can be put to use in your own organization. It will give you an understanding of the foundations of mobile learning, some insights into how important mobile learning is becoming, and how it is gaining momentum in different sectors. At the end of this article, you should have an understanding of the key concepts of mobile learning so that you can apply these concepts in order to enhance your own Moodle courses. We want to set you off on a mobile learning path that will allow you to better meet the needs and expectations of your learners who, as we will see, already use mobile devices as the backbone of their daily online interactions, and expect mobile compatibility to be the norm.

In this article, we will look at the following:

  • Background to mobile learning
  • Background to mobile devices
  • The 4 Cs of mobile learning
  • Your mobile learning strategy
  • Understanding your learners and how they use their devices
  • Mobile usage in industry
Read Developing Your Mobile Learning Strategy in full

RESTful Services JAX-RS 2.0

by Peter A. Pilgrim | September 2013 | Enterprise Articles Java

In this article by Peter A. Pilgrim, author of the book Java EE 7 Developer Handbook, we will cover the Java API for RESTful services otherwise abbreviated to JAX-RS. It was the year, 2000, when Roy Fielding published his PhD thesis entitled Representational State Transfer: an Architecture Style. Since its publication over the past decade there has been a rapid growth of interest, applications, and implementations of REST style interfaces and application.

Read RESTful Services JAX-RS 2.0 in full

Connecting to a web service (Should know)

by Geoff Chiang | September 2013 | Open Source

This article by Geoff Chiang the author of Instant Spring Tool Suite is aiming to get you up and running developing with various Spring technologies, providing you with enough to give you a head start in Spring development.

The term web service is a nebulous one, encompassing a range of both technologies and approaches. At its heart, a web service is simply a software service which is accessible over a network, designed for machine-to-machine interaction. Early web services were based on the W3C WS-* set of standards, with interfaces described using WSDL and interaction using SOAP messages. This approach seems to have fallen out of favor somewhat, with lightweight RESTful approaches now prevalent.

In this recipe, we're going to retrieve weather data from the Australian Bureau of Meteorology. This service exposes Australian weather data in JSON format. As we're about to see, STS and Spring Integration allow us to interact with web services with very little effort.

Read Connecting to a web service (Should know) in full

Managing User Logins

by Sven Vermeulen | September 2013 | Networking & Telephony Open Source

In this article, by Sven Vermeulen, the author of SELinux System Administration, has explained how to manage user logins. When we log in to an SELinux enabled system, we are assigned with a default context to work in. This context contains a SELinux user part, a SELinux role, a domain, and optionally a sensitivity range.

In this article, we will define users that have sufficient rights to do their jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection.

Read Managing User Logins in full

2-Dimensional Image Filtering

by George Siogkas | September 2013 | Beginner's Guides Open Source

In this article by George Siogkas, author of the book, Visual Media Processing Using MATLAB Beginner's Guide, we will dig a little deeper into the image filtering theory and use some more complicated techniques to enhance our images. All the methods we will present, will once more be accompanied by hands-on examples that demonstrate their significance in both typical and more advanced image processing tasks.

In this article, we shall learn:

  • The basic theory on image filtering and processing pixel neighborhoods
  • How we can filter an image using convolution
  • Alternative ways to filter an image
  • Creating image filters in MATLAB
  • Using filters for image blurring

So, let's get started!

Read 2-Dimensional Image Filtering in full

Creating Dynamic UI with Android Fragments

by Jim Wilson | September 2013 | Open Source

This article by Jim Wilson, author of Creating Dynamic UI with Android Fragments, shows how to use fragments to meet the challenges of creating dynamic UIs in the modern world of mobile app development.

Read Creating Dynamic UI with Android Fragments in full

Proportional line follower (Advanced)

by Gary Garber | September 2013 | Open Source

In this article, written by Gary Garber, the author of Instant LEGO Mindstorm EV3, you will make a robot that will track a line quickly. The robot will be able to follow a line which makes corners sharper than 90 degrees using a proportional line follower.

Read Proportional line follower (Advanced) in full

Learning the Bukkit API

by Cody M. Sommer | September 2013 | Games Open Source

In this article, by Cody M. Sommer, the author of Building Minecraft Server
, we will learn Bukkit by learning how to read its API documentation.

You may be wondering what the difference is between Bukkit and CraftBukkit. Many people use the two words interchangeably. However, they are in fact different files. In this article you will be introduced to the Bukkit API and learn what it allows you to accomplish through programming plugins for a CraftBukkit server. By the end of this article you will most likely have numerous ideas for plugins that you will eventually be able to create yourself. This article will cover the following in more detail:

  • Understanding the purpose of an API
  • Finding documentation of the Bukkit API
  • Navigating through JavaDocs to find specific information
Read Learning the Bukkit API in full

Configuring and Managing the Mailbox Server Role

by Michael Van Horenbeeck Peter De Tender | September 2013 | Cookbooks Enterprise Articles Microsoft

In this article by Michael Van Horenbeeck and Peter De Tender, authors of the book Microsoft Exchange 2013 Cookbook, you will learn how to perform the tasks necessary to set up, configure, and maintain the Mailbox Server Role, including:

  • Creating and removing mailbox databases
  • Mounting and dismounting databases
  • Moving database files to another location
  • Configuring circular logging
  • Creating and removing mailboxes
  • Managing resource mailboxes
  • Configuring mailbox size limits
  • Managing personal archives
  • Assigning mailbox permissions
  • Moving mailboxes to another database
  • Managing Public Folders
  • Configuring send and receive connectors
  • Configuring Accepted domains
  • Configuring message size limits

Over the years, the Mailbox Server Role has evolved into something more than just a place where mail data is stored. Although its primary role remains storing and managing mail-related data, it inherited large chunks of what used to be the Hub Transport server and Unified Messaging server. This shows that the Mailbox Server role in Exchange 2013 resembles an Exchange 2010 multi-role server in many ways.

Read Configuring and Managing the Mailbox Server Role in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software