Las tecnologías de Inteligencia de Negocios son parte fundamental de un negocio ya que apoyan el proceso de toma de decisiones con información clave y permiten a las empresas mantenerse alineados con la constante evolución de los mercados. La tecnología disruptiva de QlikView hace de éste un líder en la industria; con su flexibilidad y plataforma de análisis altamente poderosa, la construcción de aplicaciones QlikView está al alcance tanto de usuarios de negocio como de desarrolladores.
En este artículo por Miguel Ángel García y Barry Harmsen, autores de QlikView 11 para Desarrolladores, veremos:
- Qué es QlikView.
- Cómo explorar datos con QlikView.
- La tecnología y componentes detrás de QlikView.
- Aerolíneas HighCloud, y porqué QlikView puede ser justo la herramienta que necesitan.
This article by Gustavo De La Vega Alvarez, the author of Instant PhoneGap, has discussed how to implement geolocation in our app, we will use the API that PhoneGap provides us as part of a bunch of methods to use through our app. To build this, we need to create a JS file called myplaces.js. Create the file once using a text editor program such as Sublime Text or Notepad. Then we will perform the following steps:Read Geolocation – using PhoneGap features to improve an app's functionality, write once use everywhere in full
In this article by Matt Palmer, author of Instant Redis Persistence, we'll step through a number of different scenarios, and how you can go about protecting against each one.
While securing your data isn't strictly a persistence topic, it is an important one to consider when planning your data storage strategy. If your stored data can be accessed improperly, you're in a whole world of pain.
A common complaint about Redis is that it has no means of controlling who has access to the Redis server—if you can connect to the Redis server, you've got the ability to fully access and manipulate the data stored in that server.Read Using Redis in a hostile environment (Advanced) in full
In this article written by Piero Giacomelli, the author of the book Apache Mahout Cookbook, we will implement the Naïve Bayes classifier for creating clusters and aggregating unstructured information in a manageable way.
We will cover the following recipes in this article:
- Using the Mahout text classifier to demonstrate the basic use case
- Using the Naïve Bayes classifier from code
- Using Complementary Naïve Bayes from the command line
- Coding the Complementary Naïve Bayes classifier
This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.
Read Acting as a proxy (HttpProxyModule) in full
This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.
The list of topics that will be covered in the article is as follows:
- Understanding identity and resource pools
- Learning to create a UUID pool
- Learning to create a MAC pool
- Learning to create a WWNN pool
- Learning to create a WWPN pool
- Understanding the server pool
- Learning to create server pool membership and qualification policies
In this article by Jochen Nickel, author of Learning Microsoft Windows Server 2012 Dynamic Access Control, we will have a look at the Microsoft DAC 2012, which is an end-to-end file server solution. We will have a look at the main components of Dynamic Access Control (DAC) for better granular overview.Read Microsoft DAC 2012 in full
In this article, Alfredo Serafini, the author of Apache Solr Beginner's Guide, covers how to perform a faceted search.Read Using Faceted Search, from Searching to Finding in full
In this article by Bernardo Iraci, author of the book Blender Cycles: Lighting and Rendering Cookbook, we are going to create all the material for an iceberg. Our target is to have snow on the flat surfaces and ice on the slopes, where it is too steep for the snow to stay. Let's get started!Read Creating the ice and snow materials in full
This article written by Michael Fontanini, the author of the book Game Development with SlimDX, focuses on drawing 2D graphics using Direct2D.Read Creating a Direct2D game window class in full
This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).
Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.Read Social Engineering Attacks in full
This article by Faisal Ghadially and Kalpit Parikh, the authors of Oracle Fusion Applications Administration Essentials, provides an architectural overview and an introduction to the technical components of Oracle Fusion Applications.Read Getting Started with Fusion Applications in full
In this article by Igor Uduslivii author of iPhone Game Blueprints we will design how a game character will appear. Game worlds have become larger and give players plenty more adventure experiences. The heightened pictorial look of the characters increases players' empathy toward their avatars, generating greater feelings of exciting.Read Planning a character's look in full