In this article by Michael Kuhlmann we'll be learning the following topics:
- Why customer value proposition, sustainability, and timing matter
- How to set up memberships and make category-specific content restrictions applicable only to non-members
- Key opportunities to mention your other social networking accounts on our site
- How to implement page-specific custom scripts like a countdown timer
- More ways to reward site members for using our site
Let's bring some of these ideas to fruition.Read Social Media for Wordpress: VIP Memberships in full
This article by Richard Carter states that our theming of Magento does not have to stop at changing the way it looks. We can also add aspects of social media to it, such as:
- Integrating your Magento store with Twitter
- Improving your store's customer service
- Using social bookmarking tools such as AddThis to help your customers spread the word about your store across the Internet
With so many e-commerce stores on the Internet, using social media can make a huge difference to your store's fortunes. It can also increase your potential customers and ensure that customers continue to come back.Read Social Media in Magento in full
This article by Bill Fitzgerald, gives an overview of building user profiles. The article begins with the core profile module, and then goes deeper to show how to extend user profiles using the flexible Content Construction Kit and custom fields.
Read Social Networks and Extending the User Profile in Drupal: Part-1 in full
In this article by Monika Agarwal, the author of the book Metasploit Penetration Testing Cookbook Second Edition, we will cover:
- Getting started with the Social-Engineer Toolkit(SET)
- Working with the SET config file
- Working with the spear-phishing attack vector
- Website attack vectors
- Working with the multi-attack web method
- Infectious media generator
Documentation—if there is one word that installs fear in most developers, it must be this one. No one in their right mind would argue the value of documentation, but it is the actual act of writing it that concerns developers so.
The secret of creating good documentation is to make the process of doing so as painless as possible, and if we are lucky maybe even attractive, to the developers. The only practical way to achieve that is to reduce friction. The last thing we need when we are in middle of fixing a bug is to wrestle with our word processor, or even worse try to find the right document to update.
David J Murphy illustrates in this article, how Trac can used for the purpose of documentation.Read Software Documentation with Trac in full
The launch of Windows XP in 2001 heralded the long-awaited transition of consumer-orientated editions of Windows to the NT codebase. Microsoft designed the Windows Application Compatibility Infrastructure as part of Windows XP to help system administrators and home users solve compatibility problems with applications that were designed to run in Windows 98 or earlier versions of the 9x range.
In this article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, we will learn:
- How the Application Compatibility Infrastructure uses shims to modify incompatible applications on the fly
- Why using shims provides the best balance between compatibility and security
- How to create shims using Application Compatibility Toolkit 5.5
- Distributing compatibility databases to devices across the enterprise
This article by Russell Smith, author of Least Privilege Security for Windows 7, Vista and XP, includes information about tools and techniques that can be used to solve Least Privilege Security problems. Specifically, we will use third-party solution to configure administrative privileges for applications and Windows processes on-the-fly. Privilege Guard is a third-party solution, from Microsoft Gold Partner Avecto, that allows system administrators to dynamically add or remove privileges by modifying the logged in user's access token as it's assigned to new processes.Read Solving LUA Problems with Avecto Privilege Guard in full
Modeling book sales is not a big deal, you just need a sales fact and a book dimension, and other dimensions, such as date dimension. From this model, you can analyze daily book sales.
But, what if a book is written by more than one writer and an individual writer writes more than one book, i.e. relationship of book to writer is many to many? How would you enhance the existing book sales dimensional model, which has book granularity, to also handle sales analysis by individual writer, i.e. analysis at writer granularity?
In this article by Djoni Darmawikarta, we will discuss the two possible dimensional modeling solutions to handle many-to-many relationship.Read Solving Many-to-Many Relationship in Dimensional Modeling in full
To celebrate the recent publication of the Microsoft Dynamics GP 2010 Reporting book, Packt is pleased to announce a series of attractive discounts on our wide range of Dynamics books. For more information click here.
Dynamics GP offers a great deal of options and additional modules surrounding the core distribution modules, using which some advanced workflow and functionality can be achieved when needed. Inventory, Sales Order Processing, and Purchase Order Processing are commonly referred to as the Distribution Modules. These modules integrate with each other and with the other modules in Dynamics GP and are the modules where the transactions pertaining to inventory quantities and costs, purchases, sales, and transfers are entered.
In this article by Victoria Yudin, author of Microsoft Dynamics GP 2010 Implementation, we will cover basic setup for the Sales Order Processing (SOP) module.Read SOP Module Setup in Microsoft Dynamics GP in full
In this article by Artan Sinani, author of the book Learning Bing Maps API, iwe will learn geocoding setting up automated jobs on the Bing Maps servers. We will also learn the techniques of monitoring the jobs, and on their completion, parsing the response.
The topics covered in this article are as follows:
- Geocoding dataflow input data
- The job
- Getting job status
This article by Brett Lantz, author of Machine Learning with R, covers techniques that may not apply to every machine learning project, but could prove useful for certain types of work.Read Specialized Machine Learning Topics in full
Search is by far the most important feature of an application where data is stored and retrieved. If it hadn't been for search, Google wouldn't exist, so we can imagine the importance of search in the computing world. In today's world, search is an integral part of any application; a reliable search engine like Sphinx Search can be the difference between running a successful and unsuccessful business.
This article covers some of the most frequently asked questions on Sphinx Search.Read Sphinx Search FAQs in full
Search is by far the most important feature of an application where data is stored and retrieved. If it hadn't been for search, Google wouldn't exist, so we can imagine the importance of search in the computing world. A reliable search engine like Sphinx Search can be the difference between running a successful and unsuccessful business.
In this article by Abbas Ali, author of Sphinx Search Beginner's Guide, we will learn how to use the Sphinx API to issue search queries from your PHP applications. We will examine different query syntaxes and learn about weighting, sorting, and grouping our search results.Read Sphinx: Index Searching in full
This article by Alfonso Romero, teaches you about all the different tools available on the Internet that can help you build a very attractive weblog for your visitors. You'll learn how to upload files to your blog and use the Rich Text Editor to insert images.Read Spicing Up Your Blog: Uploading Files and Images to your Weblog using Apache Roller in full
In the previous discussion, the focus was on understanding the Model, View and Controller components of the application using Spring MVC framework. However, the developed components do not have knowledge of each other. Model is passed through Controller to the View using Logical View name. We have yet to map Logical View to the physical file. Also, to deploy the application, the application itself needs to be configured so that the Application Server knows to which component it should the route the requests. In this article by A. P. Rajshekhar, the focus will be on these two steps – configuring the components as well as configuring and deploying the application.Read Spring MVC - Configuring and Deploying the Application in full
Spring Roo is an easy-to-use tool for rapidly developing Java enterprise applications using well-recognized frameworks such as Spring, Hibernate, AspectJ, Spring Web Flow, Spring Security, GWT, Flex, and so on. Spring Roo takes care of creating project structure for your enterprise application, adding support to use Maven for building and deploying the application, creating application architecture based on your choice of technologies, creating unit and integration tests based on your choice of testing framework, and so on.
In this article by Ashish Sarin, author of Spring Roo 1.1 Cookbook, we'll look at how Spring Roo simplifies developing the web layer of an enterprise application using Spring Web MVC. We'll also look at how Spring Roo lets us quickly test our web application locally.Read Spring Roo 1.1: Working with Roo-generated Web Applications in full
Spring Security exists to fill a gap in the universe of Java third-party libraries, much as the Spring Framework originally did when it was first introduced. Standards such as Java Authentication and Authorization Service (JAAS) or Java EE Security do offer some ways of performing some of the same authentication and authorization functions, but Spring Security is a winner because it packages up everything you need to implement a top-to-bottom application security solution in a concise and sensible way. Additionally, Spring Security appeals to many because it offers out of the box integration with many common enterprise authentication systems; so it's adaptable to most situations with little effort (beyond configuration) on the part of the developer.
This article will provide you with a few tips and tricks on Spring Security.Read Spring Security 3: Tips and Tricks in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords