Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.Read Change Control for Personal Projects - Subversion Style in full
In this article by Sten Vesterli, author of Oracle ADF Enterprise Application Development – Made Simple, Second Edition, explains how to use the powerful skin editor available in JDeveloper 11g Release 2 and later versions to create Cascading Style Sheets to create a new skin, which corresponds to your enterprise visual identity, for your application.Read Changing the Appearance in full
In this two-part tutorial by Jonathan Williamson, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. This tutorial will take you through the whole process from setting up a background image as a reference, to laying out the topology, to tweaking the final model proportions and mesh structure.Read Character Head Modeling in Blender: Part 1 in full
This is the second part of the two-part tutorial by Jonathan Williamson. In this tutorial, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. To read the first part, click: Character Head Modeling in Blender: Part 1Read Character Head Modeling in Blender: Part 2 in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
In this article by Arie Geller and Matthew Lyon, authors of the book Oracle Application Express 3.2 – The Essentials and More, we will see how to save the checked checkboxes into a database table.Read Checkbox Persistence in Tabular Forms (Reports) in full
OpenStreetMap is a diverse project with hundreds of thousands of people contributing data and making use of it in different ways. As a result, many of the resources that mappers have created and use are scattered around the Internet, but the project data and much of the documentation is hosted at openstreetmap.org, on servers operated by the OpenStreetMap Foundation.
In this article by Jonathan Bennett, author of the book OpenStreetMap, we'll look at some of the following tools you can use to check OpenStreetMap data in a particular area, and what problems they can and can't tell you about:
- The data inspection tools on openstreetmap.org
- The NoName map
- ITOWorld OSM Mapper
- Geofabrik's OSM Inspector
Some of these tools identify specific problems, while others allow you to see when changes to the data were made and by whom. In either case, all these tools can do is offer guidance, not black-and-white answers, and you always need to use judgment when checking data.Read Checking OpenStreetMap Data for Problems in full
This article by Matthias Marschall author of Chef Infrastructure Automation Cookbook helps you to get started with Chef. It explains some key concepts such as cookbooks, roles, and environments and shows you how to use some basic tools such as Git, Knife, Chef Shell, Vagrant, and Berkshelf.
"What made Manhattan Manhattan was the underground infrastructure, that engineering marvel." - Andrew Cuomo
This article will cover the basics of Chef, including common terminology, workflow practices, and various tools surrounding Chef. We will explore version control using Git, walk through working with community cookbooks, and running those cookbooks on your own servers to configure them the way you need them.Read Chef Infrastructure in full
In this article by Sylvain Hellegouarch, we are going to explain how to develop a photoblog application. In the first half of this article, we will review the goals and features of this application from a high-level perspective without going into too much detail. In the second half, we will define the entities that our application will manipulate and introduce the concept of object-relational mappers, which aim at reducing the impedance mismatch between relational database and object-oriented software design. We will briefly present the most common Python ORMs and then develop our application data access layer based on the Dejavu ORM.Read CherryPy : A Photoblog Application in full
This article by Fabrizio Volpe, author of Getting Started with Microsoft Lync Server 2013, discusses about Lync 2013 mobile clients. These clients have been made available for iPhone, iPad, Windows Phone, and Android. Audio and video over IP are available with this release of the client, and this is something we have to keep in mind when we are planning our clients' deployment because the mobile version is now a viable alternative (if not a replacement) to the full Lync 2013 client.Read Choosing Lync 2013 Clients in full
With more than two million users worldwide, R is one of the most popular open source projects. It is a free and robust statistical programming environment with very powerful graphical capabilities. Analyzing and visualizing data with R is a necessary skill for anyone doing any kind of statistical analysis.
In this article we will cover:
- Choosing plotting point symbol styles and sizes
- Choosing line styles and width
- Choosing box styles
- How to adjust axis annotations and tick marks
- How to format log axes
- Setting graph margins and dimensions
In this article written by Jose Miguel Parrella, the author of the book Instant Debian – Build a Web Server explains how Debian organizes software, the architectures, and installation methods, and indicates a set of criteria for system administrators to choose and get the right media.
The Debian Project prides itself on producing the Universal Operating System. This means that the software the project puts together runs on a broad set of hardware (architectures) for several types of purposes, and even for different kernels such as Linux, Hurd, or FreeBSD.
Choosing the right flavor of Debian for your setup might seem intimidating at first, but this recipe will provide you with decision elements to help you reduce your time to market with Debian and choose the right architecture and installation method, particularly for a web server.Read Choosing the right flavor of Debian (Simple) in full
In this article by Robert Kent, author of Instant Magento Shipping How-to [Instant], We will see Magento comes equipped with a variety of shipping methods—most of which can be used for almost any type of online store.Read Choosing your shipping method in full
This article by Tanner Ezell, author of Cisco Unified Communications Manager 8: Expert Administration Cookbook focuses on implementing local route groups, device pools, and route patterns. All the recipes in this article require administrator access to the Unified Communications Manager (UCM). It is strongly recommended you get comfortable performing these recipes in a lab environment before implementing them into production.
We will cover:
- Implementing local route groups with device pools for E.164 call routing
- Implementing E.164 route patterns and partitions
- Implementing E.164 called and calling party transformations
- Implementing least cost call routing using Tail End Hop Off
- Implementing call restrictions with line blocking patterns and calling search spaces
This article by M.L.Srinivasan, covers concepts related to access control, methodologies and techniques, authentication, and access-related attacks and countermeasures.
Access control, as the name implies, is the domain that deals with controlling access to information and the associated information system assets such as computers, networks, data center, etc. As with the overall objective of information security, access control is to preserve the CIA of information assets by way of administrative, technical (logical), and physical controls.Read CISSP: Security Measures for Access Control in full
This article by M.L.Srinivasan, covers concepts related to vulnerability assessment and penetration testing.
In this article, we'll focus on IT vulnerabilities, the impact due to compromise, and the overall cycle of vulnerability and penetration tests. We'll also discuss some of the emerging standards in terms of vulnerability naming systems such as Common Vulnerabilities and Exposures (CVE), which is a dictionary for vulnerability names; and Common Vulnerability Scoring System (CVSS), as defined by the National Institute of Standards and Technology (NIST).Read CISSP: Vulnerability and Penetration Testing for Access Control in full
In this article by Luca Dentella, author of Citrix XenApp Performance Essentials we will see how optimizing session Startup, helps XenApp administrators reduce the session start-up time. Citrix XenApp (formerly Citrix WinFrame Server, Citrix MetaFrame Server, and Citrix Presentation Server) is an application virtualization product that allows users to connect to their corporate applications from a wide range of computer systems and mobile devices. XenApp can host applications on central servers and allow users to interact with them remotely or stream and deliver them to user devices for local execution.Read Citrix XenApp Performance Essentials in full
The article, Regression Trees by Prabhanjan Narayanachar Tattar, from the book Instant MongoDB, gives a tree-based regression model. This article also shows you how to build them using R functions. Of course, the recursive partitioning techniques, in most cases, may be viewed as non-linear models.
We will first introduce the notion of recursive partitions through a hypothetical dataset. It is apparent that the earlier approach of the linear models changes in an entirely different way with the functioning of the recursive partitions. Recursive partitioning depends upon the type of problem we have in hand. We develop a regression tree for the regression problem when the output is a continuous variable, as in the linear models. If the output is a binary variable, we develop a classification tree. A regression tree is first created by using the rpart function from the rpart package. A very raw R program is created, which clearly explains the unfolding of a regression tree. A similar effort is repeated for the classification tree. In the final section of this article, a classification tree is created for the German credit data problem along with the use of ROC curves for understanding the model performance. The approach in this article will be on the following lines:
- Understanding the basis of recursive partitions and the general CART.
- Construction of a regression tree
- Construction of a classification tree
- Application of a classification tree to the German credit data problem
- The finer aspects of CART
In this article by Andrew Plue, author of Microsoft System Center 2012 Endpoint Protection Cookbook, we will cover:
- Locating and interrupting client-side SCEP logs
- Performing manual definition updates and checking definition version
- Manually editing local SCEP policy using the user interface
- Utilizing MpCmdRun.exe
Read Client-Side Endpoint Protection Tasks in Microsoft SCEP 2012 in full