Article Network

Taking Control of Reactivity, Inputs, and Outputs

by Chris Beeley | October 2013 | Open Source Web Development

This article by Chris Beeley, the author of Web Application Development with R Using Shiny, enables us to extend our toolkit by learning about advanced Shiny functions. These allow us to take control of the fine details of our application, including the interface, reactivity, data, and graphics.

In order to do this, we're going to go back to the Google Analytics application and totally upgrade it, making it much smoother, more intuitive, and well-featured. The finished code and data for this advanced GA application can be found at https://github.com/ChrisBeeley/GoogleAnalyticsAdvanced.

In this article we will do the following:

  • Learn how to show and hide parts of the interface
  • Change the interface reactively
  • Finely control reactivity so functions and outputs run at the appropriate time
  • Use URLs and reactive Shiny functions to populate and alter the selections within an interface
  • Upload and download data to and from a Shiny application
  • Use custom graphics and animations in Shiny
Read Taking Control of Reactivity, Inputs, and Outputs in full

Tapestry 5 Advanced Components

by Alexander Kolesnikov | March 2008 | Content Management Java Open Source

There is a significant number of Tapestry components that we can use to build sophisticated and functionally rich interfaces. It so happens however, that many web applications have certain patterns repeating on their pages. For example, they have tables that display different data or they have forms that accept user input and then put the submitted details into some kind of JavaBean object.

Wouldn't it be convenient to have such repeating patterns already implemented as components, ready to be dropped onto a page? It certainly would, and the current version of Tapestry 5 already comes with a few components of this kind. They are great effort savers for us, and in this article by Alexander Kolesnikov we are going to introduce them and use them in our Celebrity Collector application.

Read Tapestry 5 Advanced Components in full

Target Exploitation

by Lee Allen Shakeel Ali Tedi Heriyanto | March 2014 | Open Source

This article is written by Tedi Heriyanto, Lee Allen, and Shakeel Ali, the authors of Kali Linux – Assuring Security by Penetration Testing. Target exploitation is one area that sets a penetration test apart from a vulnerability assessment. Now that vulnerabilities have been found, you will actually validate and take advantage of these vulnerabilities by exploiting the system in the hope of gaining full control or additional information and visibility into the targeted network and the systems therein. This article will highlight and discuss practices and tools that are used to conduct a real-world exploitation.

Read Target Exploitation in full

Tasks and templates

by John Arundel | July 2013 | Beginner's Guides Networking & Telephony Open Source

You can tell whether a man is clever by his answers. You can tell whether a man is wise by his questions.— Naguib Mahfouz

In this article created by John Arundel,author of Puppet 3 Beginner's Guide, you'll learn how to use Puppet's resource types to run commands, schedule regular tasks, and distribute large trees of files. You'll also find out how to insert values dynamically into files using templates.

Read Tasks and templates in full

Taxonomy and Thesauri in Drupal 6

by David Mercer | February 2009 | Content Management Drupal Open Source

In this article by David Mercer, we will see how Taxonomy makes Drupal's classification system so powerful. The method of categorizing content in Drupal makes it one of the most sophisticated content management systems around. Take the time to master working with taxonomy in Drupal, because not only will this help you to work out how to manage content better, but it will also really set your site apart from others because of the flexible and intuitive manner in which the content is organized. These attributes allow you to manage a site of pretty much any size imaginable (just in case what you are working on is "the next big thing").

Read Taxonomy and Thesauri in Drupal 6 in full

Tcl/Tk: Handling String Expressions

by Bert Wheeler | March 2011 | Open Source

Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to become a full-featured scripted programming language capable of creating elegant, cross-platform solutions.

This article by Bert Wheeler, author of Tcl/Tk 8.5 Programming Cookbook, explains how to create, manipulate, and manage string variables. We will cover:

  • Appending to a string
  • Formatting a string
  • Matching a regular expression within a string
  • Performing character substitution on a string
  • Parsing a string using conversion specifiers
  • Comparing strings
Read Tcl/Tk: Handling String Expressions in full

Tcl: Handling Email

by Piotr Beltowski Wojciech Kocjan | July 2010 | Open Source

This article by Wojciech Kocjan and Piotr Beltowski, authors of the book Tcl 8.5 Network Programming, teaches you how to send e-mails from Tcl, build e-mails containing HTML and various kinds of messages. It also discusses how to retrieve, parse, and process e-mail messages.

Read Tcl: Handling Email in full

Teaching Special Kids How to Write Simple Sentences and Paragraphs using Moodle 1.9

by Vanesa S. Olsen | July 2010 | Moodle Open Source

We can guide children to write simple sentences and paragraphs by creating different kinds of activities. Additionally, we can use many different applications to allow the student to record the sentence instead of writing it. This way, it is possible to evaluate their skills and to create motivating exercises to offer them better guidance to write simpler or more complex sentences.

Reading this article written  by Vanesa S. Olsen, author of Moodle 1.9 for Teaching Special Education Children (5-10): Beginner's Guide we will learn the following:

  • Preparing and recording a sentence with many predefined words
  • Record, encode, and upload digitalized voice as a result of a Moodle exercise
  • Prepare images that combine clipart pictures with geometric shapes
Read Teaching Special Kids How to Write Simple Sentences and Paragraphs using Moodle 1.9 in full

Team Foundation Server 2012

by Jakob Ehn Terje Sandstrom | January 2013 | Enterprise Articles

Team Foundation Server 2012 (TFS 2012) is the latest version of Microsoft's Application Lifecycle Management (ALM) system. This article by Jakob Ehn and Terje Sandstrom, authors of Team Foundation Server 2012 Starter, covers all the aspects of managing a software product over its complete lifecycle, from inception, through development and the subsequent maintenance phase for as long as it is in use.

Read Team Foundation Server 2012 in full

Technical Best Practices for Dynamics AX - Application Design Standards

by Anil Kumar Gupta | March 2008 | .NET Microsoft

Most of the qualities of an ideal ERP system such as, Total Cost of Ownership, Flexibility, Usability, Integration and many more are implemented by conformance to the technical best practices discussed in this two part article by Anil Kumar Gupta. The Dynamics AX best practice can be grouped into three categories i.e. application design standards, shared standards, and AOT object standards.

The first part of this article will discuss Application Design Standards.

Read Technical Best Practices for Dynamics AX - Application Design Standards in full

Technical Best Practices for Dynamics AX - Shared and AOT Object Standards

by Anil Kumar Gupta | March 2008 | .NET Microsoft

Most of the qualities of an ideal ERP system such as, Total Cost of Ownership, Flexibility, Usability, Integration and many more are implemented by conformance to the technical best practices discussed in this two part article by Anil Kumar Gupta. The Dynamics AX best practice can be grouped into three categories i.e. application design standards, shared standards, and AOT object standards.

The previous article discussed the Application Design Standards. This article will focus on Shared and AOT Objects Standards in Dynamics AX.

Read Technical Best Practices for Dynamics AX - Shared and AOT Object Standards in full

Techniques for Creating a Multimedia Database

by Marcelle Kratochvil | May 2013 | Enterprise Articles Oracle

This article by Marcelle Kratochvil author of Managing Multimedia and Unstructured Data in the Oracle Database, covers the technical aspects of setting up a database to use Oracle Multimedia. It contains tips, codes, and useful techniques for setting up and managing an Oracle Database and covers the core storage capabilities of the Oracle Database. The goal is to enable the database administrator to make correctly informed decisions about the physical structure of database storage objects, in particular tablespaces, datafiles, and database capabilities.

Read Techniques for Creating a Multimedia Database in full

Techniques for Creating a Multimedia Database

by Marcelle Kratochvil | May 2013 | Enterprise Articles Oracle

This article by Marcelle Kratochvil author of Managing Multimedia and Unstructured Data in the Oracle Database, covers the technical aspects of setting up a database to use Oracle Multimedia. It contains tips, codes, and useful techniques for setting up and managing an Oracle Database and covers the core storage capabilities of the Oracle Database. The goal is to enable the database administrator to make correctly informed decisions about the physical structure of database storage objects, in particular tablespaces, datafiles, and database capabilities.

Read Techniques for Creating a Multimedia Database in full

Telecommunications and Network Security Concepts for CISSP Exam

by M. L. Srinivasan | December 2009 | Networking & Telephony

The telecommunication and network security domain deals with the security of voice and data communications through local area, wide area, and remote access networking. The focus is to understand the networking models such as Open Systems Interconnect (OSI) and TCP/IP models, which are the most important models that follow a layered approach to networking, as well as the security mechanisms for Internet, Intranet, and Extranet in terms of firewalls, routers, and intrusion detection and protection systems.

The telecommunication and network security domain is one of the 10 domains of the Certified Information Systems Security Professional (CISSP) exam.

In this article by M.L.Srinivasan, we will discuss the following topics:

  • Different protocols that are in transport layer, network/internet layer, and link layer in the TCP/IP model
  • Some threats and vulnerabilities that are prevalent to such protocols
  • Common attacks and possible countermeasures
  • Important technologies and the security issues associated with them
Read Telecommunications and Network Security Concepts for CISSP Exam in full

Ten IPython essentials

by Cyrille Rossant | May 2013 | Open Source

In this article by Cyrille Rossant, author of Learning IPython for Interactive Computing and Data Visualization, we will take a quick tour of IPython by introducing 10 essential features of this powerful tool. Although brief, this hands-on visit will cover a wide range of IPython functionalities.

Read Ten IPython essentials in full

Term Extraction Tasks in SQL Server Integration Services

by Dr.Jay Krishnaswamy | March 2008 | .NET Microsoft

Microsoft SQL Server's SQL Server Integration Services is a comprehensive, full featured tool for processing data in the back-end storage locations. Extraction of attributes in a body of text is an important task while mining data and the SSIS provides just the required transformation - Term Extraction, to accomplish this task. SSIS looks through the presented text document and sorts out terms. By terms are meant specifically nouns, noun phrases, and both nouns and noun phrases. You also have the flexibility of limiting extracted terms based on their frequency of occurrence. For example you could configure the task in such a way that you can capture terms that are repeated in the body of text a certain number of times.

This tutorial by Jayaram Krishnaswamy shows a simple example of extracting terms from a body of text.

Read Term Extraction Tasks in SQL Server Integration Services in full

Terms and Concepts Related to MDX

by Tomislav Piasevoli | August 2011 | Enterprise Articles Microsoft

MDX is a powerful, yet complex language. Many terms and concepts need to be understood well enough if you want to master it. In order to help you in that mission, this article will provide with a short explanation of all important terms related to MDX.

In this article by Tomislav Piasevoli, author of MDX with Microsoft SQL Server 2008 R2 Analysis Services Cookbook, we start by explaining what MDX queries are made of, followed by the terms and concepts specific to the execution of MDX queries. The middle part of the article covers the most important things related to dimension design, cube design, and MDX script. Next, we explain terms related to query optimization and finally finish the article with types of queries that can be used with SQL Server Analysis Services.

Read Terms and Concepts Related to MDX in full

Test

by | January 2011 |

 

Buy It Now

Read Test in full

test

by | February 2012 |
Read test in full

Test Microsoft Monday Campaign

by | January 2011 |
 

To celebrate the publication of six new Microsoft books on Monday, 24th January 2011 Packt has a special offer on all the latest Microsoft books

Purchase 2 or more Microsoft books and get 25% off each book throughout January

There is also the chance to win one year's free subscription to PacktLib (worth $220) every Monday by entering Packt's Microsoft Monday Competition

 

Read Test Microsoft Monday Campaign in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software