In this article by Steven F. Daniel, author of Xcode 4 iPhone Development , we shall:
- Learn about the features and components of the Xcode development tools.
- Lean about Xcode, Cocoa, Cocoa-Touch, and Objective-C.
- Take a look into each of the iOS Technology Layers and their Components.
- Take a look into what comprises the Xcode Developer set of Tools.
- Take a look at the new features within the iOS4 SDK.
Spring Roo is an easy-to-use tool for rapidly developing Java enterprise applications using well-recognized frameworks such as Spring, Hibernate, AspectJ, Spring Web Flow, Spring Security, GWT, Flex, and so on. Spring Roo takes care of creating project structure for your enterprise application, adding support to use Maven for building and deploying the application, creating application architecture based on your choice of technologies, creating unit and integration tests based on your choice of testing framework, and so on.
In this article by Ashish Sarin, author of Spring Roo 1.1 Cookbook, we'll look at how Spring Roo simplifies developing the web layer of an enterprise application using Spring Web MVC. We'll also look at how Spring Roo lets us quickly test our web application locally.Read Spring Roo 1.1: Working with Roo-generated Web Applications in full
Social Networks are a relatively new aspect to the Web that are really taking off. Many businesses, organizations, communities, and families are using social networking to promote themselves, communicate better with others, and to engage with their audience. This article uses Drupal, a powerful and extendable Content Management System (CMS), to set up and manage a social networking website.
In this article by Michael Peacock, author of Drupal 7 Social Networking, we will learn:
- How to manage users, roles, and their permissions
- About Gravatars and how to enable them
- How users can track the activity of each other
- How to extend user profiles
- About settings and rules for users
- How to give authenticated users a more relevant home page
jQuery provides a wide range of features, an easy-to-learn syntax, and robust cross-platform compatibility in a single compact file. This article by Jonathan Chaffer and Karl Swedberg, authors of Learning jQuery, Third Edition, covers the following topics:
- Custom events
- Throttling events
- Deferred objects
- The jqXHR object
WebSphere Application Server, often referred to simply as WAS, is a JEE-compliant application server platform. JEE stands for Java Enterprise Edition and was previously referred to as J2EE. JEE application servers provide functionality to deploy fault-tolerant, distributed, and multi-tier Java software.
In this article by Steve Robinson, author of IBM WebSphere Application Server 8.0 Administration Guide, we will be covering a few of the command-line tools shipped with WAS to help you with problem diagnosis when WebSphere or applications are not running as they should. We will also introduce the IBM Support Assistant, a very powerful WebSphere Application Server (WAS) support tool, and walk through how to analyze a WAS log file using one of the many ISA add-ons.
Specifically we will cover the following topics:
- Dumping namespaces
- EAR expander
- IBM Support Assistant (ISA)
In this article by Ellen Marie Murphy, author of Mahara 1.4 Cookbook, we will examine a few of the many plugins and add-ons available for Mahara. These will need to be installed on the server and then configured from the Administration page.
Specifically, we will cover:
- Adding a spreadsheet and chart using Google apps
- Using Embed.ly to add a Google map
- Adding the Facebook Like button to a page
- Adding the Twitter Tweet button to a page
- The Continuing Professional Development artifact
The logic tier of LightSwitch basically starts with a data service that encapsulates all the access to the data source. This tier can host any number of data services exposed as endpoints at the service boundary. Each data service exposes a number of queryable entity sets with operations for querying entities and an operation for submitting changes; add, update, and delete. An entity set contains entities of the same entity type. All operations take place with entity sets whether they are intended for fetching or for making changes to them. If you think of an entity set as an analogue of SQL table you will not be wrong. Just like you take information out of the table, make changes to it and return it to the table, you do likewise with entity sets.
In this article by Jayaram Krishnaswamy, author of Microsoft Visual Studio LightSwitch Business Application Development, we will take a look at querying a single entity.Read Microsoft LightSwitch: Querying and Filtering Data in full
A Query is a question you pose to the database so as to retrieve a specific piece of information in the database. The querying in LightSwitch can be best understood by looking at how it is structured. Querying in LightSwitch can be carried out using the built-in Query Designer but more advanced querying can be carried out using code.
This article by Jayaram Krishnaswamy, author of Microsoft Visual Studio LightSwitch Business Application Development, describes the use of the built-in Query Designer in the IDE to query the entities in the data sources.Read Microsoft LightSwitch: Querying Multiple Entities in full
If you are a newbie to MDM and want to start from the basics, this is the right article for you. Even if you have hands on experience with an MDM system, you can refresh your basics by reading this article and understand the high-level aspects of MDM and the key capabilities supported by an MDM repository.
In this article by Uday Rao, author of SAP NetWeaver MDM 7.1 Administrator's Guide, you will learn the following topics:
- MDM IT Scenarios
- MDM Business Scenarios
- MDM Server know how
- MDM repository structure
- Key capabilities supported by an MDM repository
Wireless Networks have become ubiquitous in today's world. Millions of people use them worldwide every day at their homes, offices, and public hotspots to log on to the Internet and do both personal and professional work.
In this article by Vivek Ramachandran, author of BackTrack 5 Wireless Penetration Testing Beginner’s Guide, we will look at how we can conduct advanced attacks. We will primarily focus on Man-in-the-Middle (MITM) attack, which requires a certain amount of skill and practice to conduct successfully. Once we have done this, we will use this MITM attack as a base to conduct more sophisticated attacks such as Eavesdropping and Session Hijacking.
We will cover the following:
- Man-in-the-Middle attack
- Wireless Eavesdropping using MITM
- Session Hijacking using MITM
In this article by Jason D. Straughan, author of Kohana 3.0 Beginner’s Guide, we will take a look at how we can use routes to keep our users, and data, flowing to the proper controller actions, and how to build dynamic applications using Kohana’s routing abilities.
Specifically, we will cover:
- Routing in Kohana
- How to use Routing in our applications
- Advanced routing techniques
Kohana utilizes the HMVC design pattern, and allows us to create requests essentially anywhere within our applications. The request flow is the order in which files are loaded, starting with index.php and moving throughout the framework, loading essential files, processing the requests, and rendering any output.
In this article by Jason D. Straughan, author of Kohana 3.0 Beginner’s Guide, we will learn:
- What HMVC is, and how it works
- Kohana’s Request Flow
- How to use the Request class
Authentication is a process where we establish if someone is who he or she claims to be. The most common way is by a unique username and password. This article by Dirk van der Walt, author of FreeRADIUS Beginner's Guide, teaches authentication methods and how they work. Extensible Authentication Protocol (EAP) is covered later in a dedicated article.
In this article we shall:
- Discuss PAP, CHAP, and MS-CHAP authentication protocols
- See when and how authentication is done in FreeRADIUS
- Explore ways to store passwords
- Look at other authentication methods
In the previous article we covered the Authentication Methods used while working with FreeRADIUS. This article by Dirk van der Walt, author of FreeRADIUS Beginner's Guide, teaches methods for storing passwords and how they work. Passwords do not need to be stored in clear text and it is better to store them in a hashed format. There are, however, limitations to the kind of authentication protocols that can be used when the passwords are stored as a hash which we will explore in this article.Read FreeRADIUS Authentication: Storing Passwords in full
Only Unity fits the bill of being a game engine that allows you to create a full 3D game for free, and with phenomenal community support.
In this article by Jate Wittayabundit, author of Unity 3 Game Development Hotshot, we will learn how to create a rocket launcher. Here, we will first use the FPS camera and controller from the Unity built-in FPS package, but we will tweak our camera view to see from the character's shoulder as in Resident Evil 4 or 5. Then, we will adapt the built-in FPS controller script to be able to play the animation of the character, and make the controller similar to the Resident Evil style controller. Next, we will create a rocket prefab and the rocket launcher script to fire our rocket, which will also include the use of the built-in fire explosion particle and custom smoke particle effect from the launcher when we fire.Read Unity 3: Building a Rocket Launcher in full