In this article by Ralph Roberts, the author of Yammer Starter , will help us increase our interaction with people by experimenting with several tasks on Yammer.
In this article, we will cover the following topics:
Posting an update
Posting a photo or other graphics
Commenting and complimenting
Yes we LIKE that
Using the bottom line
In this article by Taras Kalapun, the author of RestKit for iOS, discusses how to connect to MonoHq API with RestKit. While performing a request operation, the object manager will use the base URL and the provided request path, to construct the NSURL object with [NSURL URLWithString:relativeToURL:]. The way this method evaluates the relativity of the URL can sometimes be confusing and surprising, and one can experience a lot of errors regarding this. For example, a small part of the AFNetworking documentation is provided, so one can better understand how the base URL and different paths interact.Read Connecting to MongoHq API with RestKit in full
SQL Server Compact Edition 3.5 can be used to create applications that are useful for a number of business uses such as: Portable applications; Occasionally connected clients and embedded applications and devices. SQL Server Compact differs from other SQL Servers in that there is just one file which can be password protected and features 128-bit file level encryption. It is referential integrity compliant; supports multiple connections; has transactions support with rich data types.
In this tutorial by Jayaram Krishnaswamy, various scenarios where you may need to connect to SQL Server Compact using Visual Studio IDE (both 2008 and 2010) are described in detail. Connecting to SQL Server Compact 4.5 using Visual Studio 2010 Express (free version of Visual Studio) is also described. The connection is the starting point for any database related program and therefore mastering the connection task is crucial to work with the SQL Server Compact.Read Connecting to Microsoft SQL Server Compact 3.5 with Visual Studio in full
A backend server can be defined as any HTTP server from which Varnish Cache can request and fetch data. In this article by Roberto Moutinho author of Instant Varnish Cache How-to, we will define our backend servers, probe those servers for their health status, and direct our clients' requests to the correct backend servers.Read Connecting to backend servers (Should know) in full
This article by Geoff Chiang the author of Instant Spring Tool Suite is aiming to get you up and running developing with various Spring technologies, providing you with enough to give you a head start in Spring development.
The term web service is a nebulous one, encompassing a range of both technologies and approaches. At its heart, a web service is simply a software service which is accessible over a network, designed for machine-to-machine interaction. Early web services were based on the W3C WS-* set of standards, with interfaces described using WSDL and interaction using SOAP messages. This approach seems to have fallen out of favor somewhat, with lightweight RESTful approaches now prevalent.
In this recipe, we're going to retrieve weather data from the Australian Bureau of Meteorology. This service exposes Australian weather data in JSON format. As we're about to see, STS and Spring Integration allow us to interact with web services with very little effort.Read Connecting to a web service (Should know) in full
Schools, colleges, and universities all over the world are installing Moodle, but many educators aren't making much use of it. With so many features, it can be a hassle to learn—and with teachers under so much pressure day-to-day, they cannot devote much time to recreating all their lessons from scratch.
In this article, by Ian Wild author of Moodle 2.0 Course Conversion ,we're going to see how to lay the foundations for moving your department's courses into Moodle. In this article we will take a look at:
- What counts as a Moodle course
- Creating your course
- Configuring the Backyard Ballistics course
Workflow is an automation of a business process, during which documents are passed from one participant to another for action, according to a set of procedural rules. Every content management system implementation will have workflow requirements. Workflow provides ownership and control on the content and processes. Alfresco web project uses workflows to support any set of changes, either automated or user-driven steps, in a business process before final commit to the Staging Sandbox. WCM Workflows can be configured for each form or for any arbitrary set of non-form assets.
In this article by Amita Bhandari, co-author of the book Alfresco 3 Web Content Management, we will take a look at the following:
- Associating workflows to web forms
- Associating workflows to web projects
- Dynamically changing workflow for each snapshot submission
In this article by Kerri Shotts, the author of Instant PhoneGap Social App Development, we will look into the installation and configuration of the ChildBrowser plugin.
Most PhoneGap plugins aren't terribly hard to install or configure, but they will undoubtedly play a vital role in your app, especially if you need to use a feature that PhoneGap doesn't provide on its own.
In our case, we will look at a plugin called ChildBrowser.Read Configuring the ChildBrowser plugin in full
In this article by Brad Lhotsky, the author of Instant OSSEC Host-based Intrusion Detection, we will look at various options for adjusting the alert volume for OSSEC HIDS. We will start with some broad, sweeping approaches to decrease e-mails and gradually increase our granularity. We will also explore the different channels for alerting.
The biggest failure of security software is the volume of unactionable alerts. Silencing alerts and investigating false positives robs an organization's valuable hours that it could use to enhance its security posture. OSSEC provides its users with options to fine-tune alerting to keep from becoming the boy who cried "Wolf!".Read Configuring the alerts in full
Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. In this article we will learn about the different configuration options available and the transparent and accelerated modes that enable you to focus on particular areas of your network.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will cover:
- Configuring Squid to use DNS servers
- A few directives related to logging
- Other important or commonly used configuration directives
sipXecs has several server-side features that provide additional functionality. These functionalities are not otherwise available in the phones themselves. Many of the basic features will be covered in this article. This ever-increasing list of system features helps set sipXecs apart from its competition. As you will discover in this article, the features are easy to configure and they are easy for the end user to utilize. In this article by Michael W. Picher, we will cover configuration of the following services:
- Auto attendant
- Paging Groups
- Call Park Orbits
- Music on Hold
Read Configuring sipXecs Server Features in full
This article, by Marius Sandbu, the Author of Microsoft System Center Configuration Manager, covers how you can deploy different Configuration Manager roles that are highly available.Read Configuring Roles for High Availability in full
In this article, by Murat Yilmaz, author of Instant E-commerce with OpenCart:Build a Shop, we will learn that OpenCart supports a wide range of payment methods and services. We will learn how to integrate one of the most popular online payment services, that is, PayPal into our store. PayPal offers several solutions. Two popular ones are PayPal Website Payments Standard and PayPal Website Payments Pro.Read Configuring payment models (Intermediate) in full
A search feature in a website is always beneficial. In this article by Dan Liliedahl, we will see how to add search capabilities to an OpenCms website and will also discuss how to create a search index for blog content. Before all this we will start of with a small discussion on Lucene search engine.Read Configuring OpenCms Search in full
In this article by Daniel Schneller and Udo Schwedt, authors of MySQL Admin Cookbook, we will discuss the following:
- Setting up a fixed InnoDB tablespace
- Setting up an auto-extending InnoDB tablespace
- Storing InnoDB data in one file per table
- Decreasing InnoDB tablespace
- Enabling and configuring binary logging
In this article by Jordan Krause, the author of the book Microsoft DirectAccess Best Practices and Troubleshooting, we will have a look at how Manage Out is configured to DirectAccess clients. DirectAccess is obviously a wonderful technology from the user's perspective. There is literally nothing that they have to do to connect to company resources; it just happens automatically whenever they have Internet access. What isn't talked about nearly as often is the fact that DirectAccess is possibly of even greater benefit to the IT department. Because DirectAccess is so seamless and automatic, your Group Policy settings, patches, scripts, and everything that you want to use to manage and manipulate those client machines is always able to run. You no longer have to wait for the user to launch a VPN or come into the office for their computer to be secured with the latest policies. You no longer have to worry about laptops being off the network for weeks at a time, and coming back into the network after having been connected to dozens of public hotspots while someone was on a vacation with it. While many of these management functions work right out of the box with a standard DirectAccess configuration, there are some functions that will need a couple of extra steps to get them working properly. That is our topic of discussion for this article.
We are going to cover the following topics:
- Pulls versus pushes
- What does Manage Out have to do with IPv6
- Creating a selective ISATAP environment
- Setting up client-side firewall rules
- RDP to a DirectAccess client
- No ISATAP with multisite DirectAccess
In this article by Xuekun Kou, we will discuss how to use a load balancer to distribute load across the server instances in the cluster. We will also discuss the High Availability (HA) options supported by GlassFish, and how to enable HA.Read Configuring Load Balancers and High Availability in GlassFish in full
This two part article series by Xuekun Kou, provides you with an introduction to configuring JMS resources in GlassFish. This article also shows you how to configure the MDB container.
In this article, we will discuss how to configure Java Message Service (JMS) resources in GlassFish. We will begin the article with an overview of message systems and the support of JMS on GlassFish. We will then discuss how to configure two popular open source JMS service providers, the Open Message Queue (Open MQ) and Apache ActiveMQ.Read Configuring JMS Resources in GlassFish: Part 1 in full