In this article by Gábor Bakos, the author of KNIME Essentials, introduces the main terminologies and concepts of KNIME.
It is important to share your thoughts and problems using the same terms. This makes it easier to reach your goal, and others will appreciate if it is easy to understand. This section will introduce the main concepts of KNIME.Read KNIME terminologies in full
This article details Flight's advantages over other frameworks. This includes its shallow-learning curve, reliability, reusability, agnostic architecture, performance, and the idea of well-organized freedom. At the end of the article, you can find some specific scenarios such as single-page apps and classic web pages.Read Getting Started with Twitter Flight in full
In this article by Venkateshwaran Loganathan, the author of PySide GUI Application Development, we will look into some of the internal implementation working concepts of those functions. Being an event-driven toolkit, events and event delivery play an important role in the Qt architecture. We will start this article by discussing events and signals, their implementation, and will go on to discuss handling drag-and-drop events, and drawing functionalities.Read Events and Signals in full
In this article by Belén Cruz Zapata, author of Android Studio Application Development, we will see how to create visually appealing applications using the new IntelliJ IDE Android Studio. The various tools needed for handling the UI of the devices and other properties such as themes are discussed in detail.Read Creating User Interfaces in full
This article by Juzer Ali, the author of Instant Node Package Manager, has been specially created to provide you with all the information that you need to set up with node.js and npm. You will learn the basic usage of node package manager, get started with adding dependencies, and modularizing code in different files and folders.Read Learning to add dependencies in full
In this article by Jordan Krause, the author of the book Microsoft DirectAccess Best Practices and Troubleshooting, we will have a look at how Manage Out is configured to DirectAccess clients. DirectAccess is obviously a wonderful technology from the user's perspective. There is literally nothing that they have to do to connect to company resources; it just happens automatically whenever they have Internet access. What isn't talked about nearly as often is the fact that DirectAccess is possibly of even greater benefit to the IT department. Because DirectAccess is so seamless and automatic, your Group Policy settings, patches, scripts, and everything that you want to use to manage and manipulate those client machines is always able to run. You no longer have to wait for the user to launch a VPN or come into the office for their computer to be secured with the latest policies. You no longer have to worry about laptops being off the network for weeks at a time, and coming back into the network after having been connected to dozens of public hotspots while someone was on a vacation with it. While many of these management functions work right out of the box with a standard DirectAccess configuration, there are some functions that will need a couple of extra steps to get them working properly. That is our topic of discussion for this article.
We are going to cover the following topics:
- Pulls versus pushes
- What does Manage Out have to do with IPv6
- Creating a selective ISATAP environment
- Setting up client-side firewall rules
- RDP to a DirectAccess client
- No ISATAP with multisite DirectAccess
In this article, by Giuseppe Macri, author of Integrating Facebook iOS SDK with Your Application, we will learn about:Read Creating a New iOS Social Project in full
This article by Brank Ajzele, author of the the book Getting Started with Magento Extension Development, introduces you to Magento extensions, Magento shipping methods system, Magento payment methods system, and packaging and publishing your extension.Read Introducing Magento Extension Development in full
This article created by Hemant Kumar Mehta, the author of Getting Started with Oracle Public Cloud, discusses various cloud services offered by Oracle and the architecture of the Oracle Cloud Services. The following topics will be covered in this article:
- A brief review of cloud computing concepts
- Oracle Cloud Services
- Application Services
- Social Services
- Platform Services
- Common Infrastructure Services
- Oracle Managed Services
- Architecture of Oracle Cloud solution
- Trying Oracle Public Cloud Services
This article by Aaron Martinez and Enrique Fernández, authors of the book Learning ROS for Robotics Programming, talks about configuring your robot to use it in the navigation stack. Now, in this article, you will learn something that is probably one of the most powerful features in ROS, something that will let you move your robot autonomously.
Thanks to the community and the shared code, ROS has many algorithms that can be used for navigation.
First of all, in this chapter, you will learn all the necessary ways to configure the navigation stack with your robot. In particular, we will cover the following items in this article:
- Introduction to the navigation stacks and their powerful capabilities—clearly one of the greatest pieces of software that comes with ROS.
- The TF is explained in order to show how to transform from the frame of one physical element to the other; for example, the data received using a sensor or the command for the desired position of an actuator.
- We will see how to create a laser driver or simulate it.
- We will learn how the odometry is computed and published, and how Gazebo provides it.
- A base controller will be presented, including a detailed description of how to create one for your robot.
- We will see how to execute SLAM with ROS. That is, we will show you how you can build a map from the environment with your robot as it moves through it.
- Finally, you will be able to localize your robot in the map using the localization algorithms of the navigation stack.
In this article created by Surendra Mohan, the author of Administrating Solr, we will learn how to nest a query within another query, about stats.jsp, how to use ping status, and what are business rules, how and when they prove to be important for us and how to write your custom rule using Drools.Read Administrating Solr in full
In this article created by Vangel Krstevski, the author of the book Hyper-V Replica Essentials, you will get an idea of conﬁguring Hyper-V Replica in various deployment scenarios, which will help you learn how to conﬁgure this new feature and improve the systems' availability in your datacenter.Read Your first step towards Hyper-V Replica in full
In this article, by Willie L. Pritchett, author of the book Kali Linux Cookbook, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, there is a price to be paid; wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating radio network traffic including mobile phones and wireless networks.
We will cover the following topics in this article:
- Wireless network WEP cracking
- Wireless network WPA/WPA2 cracking
- Automating wireless network cracking
- Accessing clients using a fake AP
- URL traffic manipulation
- Port redirection
- Sniffing network traffic
For those people who get sweaty palms just thinking of the word script, wipe your hands and relax. In this article, written by Terry Norton, author of the book Learning C# by Developing Games with Unity 3D, terms that are already familiar to you will be used to introduce the building blocks of programming.
A programming language such as C# can appear to be very complicated at first but in reality, there are two parts that form its foundation. These parts are variables and methods. Therefore, understanding these critical parts is a prerequisite for learning any of the other features of C#. Being as critical as they are, they are very simple concepts to understand. Using these variable and method foundation pieces, we'll be introduced to the C# building blocks used to create Unity scripts.
- Using variables in a script
- Using methods in a script
- The class which is a container for variables and methods
- Turning a script into a Component
- Components communicating using the Dot Syntax
Let's have a look at these primary concepts.Read Introducing the Building Blocks for Unity Scripts in full