Article Network

All | June | May | April

Building a Private App

by Michael Larkin | May 2014 | Open Source

This article, by Michael Larkin, the author of the book Shopify Application Development, highlights building a Private App.

Read Building a Private App in full

Interacting with Data for Dashboards

by Jen Stirrup | May 2014 | Cookbooks

In this article by Jen Stirrup, the author of Tableau Dashboard Cookbook, we will apply the practice and theory of data visualization to dashboards. This will help deliver effective dashboards. We will learn to create Tableau dashboards quickly and easily.

Read Interacting with Data for Dashboards in full

3D Websites

by Mitch Williams | May 2014 | Games Open Source Web Development

In this article by Mitch Williams, author of the book WebGL Hotshot, we will revisit X3D to create engaging scenes and we will then add portals to transport within a 3D website for faster navigation.

Read 3D Websites in full

Ruby and Metasploit Modules

by Nipun Jaswal | May 2014 | Open Source

In this article, by Nipun Jaswal, the author of Mastering Metasploit, we will cover the basics of Ruby programming and understand the various syntaxes and semantics of it. This article will also make it easy for you to write Metasploit modules. We will see how we can design and fabricate various custom Metasploit modules.

Read Ruby and Metasploit Modules in full

Network Exploitation and Monitoring

by Keith Makan | May 2014 | Networking & Telephony

This article by Keith Makan, the author of Penetration Testing with the Bash shell, covers man-in-the-middle attacks that can be performed with the help of ARP abuse, methods to interrogate servers, and assessment of automated web application security.

Read Network Exploitation and Monitoring in full

Ranges

by Adam D. Ruppe | May 2014 | Cookbooks Open Source

This article by Adam D. Ruppe, the author of the book D Cookbook, goes into the details of an artefact central to the Phobos standard library with a little core language support: ranges. Ranges are user-defined objects used to build iterators over a collection of items. We will concentrate more on sorting and searching ranges, and using functional tools to query data.

Read Ranges in full

A/B Testing – Statistical Experiments for the Web

by Eric Rochester | May 2014 | Architecture & Analysis Open Source

In this article by Eric Rochester, author of Mastering Clojure Data Analysis, we will learn to define, conduct, and analyze A/B testing

Read A/B Testing – Statistical Experiments for the Web in full

Virtual Machine Design

by Brian Bolander Christopher Kusek | May 2014 | Enterprise Articles

In this article, by Christopher Kusek and Brian Bolander, the author of vSphere Design Best Practices, you will learn the concepts of the virtual machines themselves.

Read Virtual Machine Design in full

Running our first web application

by Filippe Costa Spolti | May 2014 | Open Source

This article by Filippe Costa Spolti, the author of WildFly: New Features, will describe the activities that need to be performed, and configuration that needs to be done, on the server to execute the deployment of a simple application that will be used in this article to illustrate a basic deployment. This application will be used to accomplish a few more settings, such as context root and virtual host. Also, I will describe a little about deployment into a single standalone server and, in some server instances, running in the domain mode

Read Running our first web application in full

An Introduction to the Terminal

by Jay LaCroix | May 2014 | Open Source

In this article by Jay LaCroix, the author of the book "Linux Mint Essentials", has discussed about the importance and usage of the terminal. Mint is an incredibly rich experience, and it may seem that the developers have thought of everything and included a graphical application to configure just about anything you can think of. However, for those who aspire to be an administrator of Linux systems or just want to achieve advanced skills, learning shell commands is definitely recommended. For some tasks, executing commands can actually save time. In this article, we'll learn the basics of the Linux shell and commands related to it.

In this article, we will discuss the following topics:

  • Why should we use the terminal?
  • Accessing the shell
  • Executing commands
  • Navigating the filesystem
  • Managing files
  • The nano text editor
  • Reading manual pages with the man command
  • Searching for files
  • Using the watch command
  • Introduction to scripting
Read An Introduction to the Terminal in full

Data Warehouse Design

by Reza Rad | May 2014 | Beginner's Guides Enterprise Articles

This article by Reza Rad, the author of Microsoft SQL Server 2014 Business Intelligence Development Beginner's Guide, is about one of the hot topics in most of the job markets around the world—Business Intelligence (BI).

Read Data Warehouse Design in full

Updating data in the background

by Dimitris Tavlikos | May 2014 | Cookbooks Open Source

In this article, written by Dimitris Tavlikos, the author of iOS Development with Xamarin Cookbook, we will learn how to make use of iOS 7's background fetch feature. This feature automatically wakes up the app at system-managed intervals, giving it a specific amount of time to retrieve data and update the UI.

Read Updating data in the background in full

Continuous Integration

by Zdenek Machek | May 2014 | Open Source Web Development

You have code and you have tests, but now you need to take complete advantage of them in order for them to really help you. What you need to do is run these tests, process the results, and then receive a notification if they fail. This is where we are heading in this article by Zdenek Machek, author of PHPUnit Essentials, and there are a few really good open source or free solutions available that can help you.

Read Continuous Integration in full

Configuring placeholder datastores

by Abhilash GB | May 2014 | Enterprise Articles

In this article, by Abhilash GB, author of the book, Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager, we will see the steps followed in order to configure a placeholder datastore. For every virtual machine that becomes part of a Protection Group, SRM creates a shadow virtual machine. A placeholder datastore is used to store the files for the shadow virtual machines. The datastore used for this purpose should be accessible to all the hosts in the datacenter/cluster serving the role of a recovery-host. For now, understand that configuring placeholder datastores is an essential step in forming an SRM environment.

Read Configuring placeholder datastores in full

Going Beyond the Basics

by John Ewart | May 2014 | Networking & Telephony Open Source

In this article by John Ewart, author of Managing Windows Servers with Chef, we learn various aspects about Chef's language and also learn to handle multiple platforms.

Read Going Beyond the Basics in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software