Microsoft Dynamics GP 2013 is a sophisticated Enterprise Resource Planning system used throughout the world. Implementing Dynamics GP for an organization can be a daunting task, requiring thorough planning and understanding of the available features and options. This article provides guidance for the planning, installation, and setup of Microsoft Dynamics GP 2013 with examples, advice, step-by-step guides, illustrations, and links to useful resources.
Most likely, you have already started training users. For many companies training is an ongoing process. In this article by Victoria Yudin, the author of Microsoft Dynamics GP 2013 Implementation, you will go over some ideas for planning your initial, as well as ongoing, training. We will also discuss tools available from Microsoft for your Dynamics GP system. Finally, some troubleshooting tips and additional resources will be listed to help you maintain and get the most out of Dynamics GP.Read Training, Tools, and Next Steps in full
This article by Shea Silverman, author of Instant Raspberry Pi Gaming, will describe how to install MAME4All through the Raspberry Pi Store. It will also explain how to run it from both the GUI and the CLI, and how to add games.Read Installing MAME4All (Intermediate) in full
Phones are everywhere! From calling to texting, you use phones for your business and for personal use. Twilio provides an API that lets you combine phone calls and SMS messages with your websites. In this article by Roger Stringer, the author of Twilio Cookbook we will cover two recipes which will help us to learn how to send message and make phone from your website with the help of Twilio.Read Make phone calls, send SMS from your website using Twilio in full
In this article by Joseph Muniz and Aamir Lakhani, the authors of the book Web Penetration Testing with Kali Linux, web Penetration Testing is described in brief. Many organizations offer security services and use terms such as security audit, network or risk assessment, and Penetration Test with overlapping meanings. By definition, an audit is a measurable technical assessment of a system(s) or application(s). Security assessments are evaluations of risk, meaning services used to identify vulnerabilities in systems, applications, and processes.Read Penetration Testing and Setup in full
In this article by Daniel Li, author of the book Instant Brainshark, we'll be looking at how to take full advantage of Brainshark's narrated slideshow functionality by following best practices in the presentation design. This will be covered using a list of tips, followed by why these best practices are followed in industry. Lastly, we will look into ways to aesthetically improve existing and future presentations.Read Increasing sales with Brainshark slideshows/documents in full
This article written by Mark Aberdour, the author of Moodle for Mobile Learning, aims to provide you with a vision of how Moodle for mobile learning can be put to use in your own organization. It will give you an understanding of the foundations of mobile learning, some insights into how important mobile learning is becoming, and how it is gaining momentum in different sectors. At the end of this article, you should have an understanding of the key concepts of mobile learning so that you can apply these concepts in order to enhance your own Moodle courses. We want to set you off on a mobile learning path that will allow you to better meet the needs and expectations of your learners who, as we will see, already use mobile devices as the backbone of their daily online interactions, and expect mobile compatibility to be the norm.
In this article, we will look at the following:
- Background to mobile learning
- Background to mobile devices
- The 4 Cs of mobile learning
- Your mobile learning strategy
- Understanding your learners and how they use their devices
- Mobile usage in industry
In this article by Peter A. Pilgrim, author of the book Java EE 7 Developer Handbook, we will cover the Java API for RESTful services otherwise abbreviated to JAX-RS. It was the year, 2000, when Roy Fielding published his PhD thesis entitled Representational State Transfer: an Architecture Style. Since its publication over the past decade there has been a rapid growth of interest, applications, and implementations of REST style interfaces and application.Read RESTful Services JAX-RS 2.0 in full
This article by Geoff Chiang the author of Instant Spring Tool Suite is aiming to get you up and running developing with various Spring technologies, providing you with enough to give you a head start in Spring development.
The term web service is a nebulous one, encompassing a range of both technologies and approaches. At its heart, a web service is simply a software service which is accessible over a network, designed for machine-to-machine interaction. Early web services were based on the W3C WS-* set of standards, with interfaces described using WSDL and interaction using SOAP messages. This approach seems to have fallen out of favor somewhat, with lightweight RESTful approaches now prevalent.
In this recipe, we're going to retrieve weather data from the Australian Bureau of Meteorology. This service exposes Australian weather data in JSON format. As we're about to see, STS and Spring Integration allow us to interact with web services with very little effort.Read Connecting to a web service (Should know) in full
In this article, by Sven Vermeulen, the author of SELinux System Administration, has explained how to manage user logins. When we log in to an SELinux enabled system, we are assigned with a default context to work in. This context contains a SELinux user part, a SELinux role, a domain, and optionally a sensitivity range.
In this article, we will define users that have sufficient rights to do their jobs, ranging from unprivileged users to fully privileged users, running almost without SELinux protection.Read Managing User Logins in full
In this article by George Siogkas, author of the book, Visual Media Processing Using MATLAB Beginner's Guide, we will dig a little deeper into the image filtering theory and use some more complicated techniques to enhance our images. All the methods we will present, will once more be accompanied by hands-on examples that demonstrate their significance in both typical and more advanced image processing tasks.
In this article, we shall learn:
- The basic theory on image filtering and processing pixel neighborhoods
- How we can filter an image using convolution
- Alternative ways to filter an image
- Creating image filters in MATLAB
- Using filters for image blurring
So, let's get started!Read 2-Dimensional Image Filtering in full
This article by Jim Wilson, author of Creating Dynamic UI with Android Fragments, shows how to use fragments to meet the challenges of creating dynamic UIs in the modern world of mobile app development.Read Creating Dynamic UI with Android Fragments in full
In this article, written by Gary Garber, the author of Instant LEGO Mindstorm EV3, you will make a robot that will track a line quickly. The robot will be able to follow a line which makes corners sharper than 90 degrees using a proportional line follower.Read Proportional line follower (Advanced) in full
In this article, by Cody M. Sommer, the author of Building Minecraft Server
Modifications, we will learn Bukkit by learning how to read its API documentation.
You may be wondering what the difference is between Bukkit and CraftBukkit. Many people use the two words interchangeably. However, they are in fact different files. In this article you will be introduced to the Bukkit API and learn what it allows you to accomplish through programming plugins for a CraftBukkit server. By the end of this article you will most likely have numerous ideas for plugins that you will eventually be able to create yourself. This article will cover the following in more detail:
- Understanding the purpose of an API
- Finding documentation of the Bukkit API
- Navigating through JavaDocs to find specific information
In this article by Michael Van Horenbeeck and Peter De Tender, authors of the book Microsoft Exchange 2013 Cookbook, you will learn how to perform the tasks necessary to set up, configure, and maintain the Mailbox Server Role, including:
- Creating and removing mailbox databases
- Mounting and dismounting databases
- Moving database files to another location
- Configuring circular logging
- Creating and removing mailboxes
- Managing resource mailboxes
- Configuring mailbox size limits
- Managing personal archives
- Assigning mailbox permissions
- Moving mailboxes to another database
- Managing Public Folders
- Configuring send and receive connectors
- Configuring Accepted domains
- Configuring message size limits
Over the years, the Mailbox Server Role has evolved into something more than just a place where mail data is stored. Although its primary role remains storing and managing mail-related data, it inherited large chunks of what used to be the Hub Transport server and Unified Messaging server. This shows that the Mailbox Server role in Exchange 2013 resembles an Exchange 2010 multi-role server in many ways.Read Configuring and Managing the Mailbox Server Role in full