In Build your own Application to access Twitter using Java and NetBeans: Part 1 of this article series, we saw a simple way to see your last tweet via a Java application called SwingAndTweet using the Twitter4J API.
In this article by Alfonso Romero, we will add some more functionality to our SwingAndTweet Java application.
Here, we will learn how to:
- Create a twitterLogin dialog to take care of the login process
- Add functionality to show your 20 most recent tweets right after logging in
- Add the functionality to update your Twitter status
In this article by Alfonso Romero, we will discuss how to go about building a custom application for Twitter using Java and NetBeans, instead of using the standard web interface. We will learn how to log into Twitter using our application and also see the last tweet posted by you.Read Build your own Application to access Twitter using Java and NetBeans: Part 1 in full
With jQTouch, web developers can build smartphone interfaces for their existing web applications by simply transforming an existing Document Object Model (DOM) structure into an interface that works, looks and feels like native iPhone or Android application. In this tutorial by Mambe Churchill Nanje, we will learn how to develop such an application.Read Build iPhone, Android and iPad Applications using jQTouch in full
In this article written by Demetrio Filocamo, we are going to develop the contacts management feature of our application i.e the contact managers, which includes listing, adding, editing, and deleting contacts—all of this the Ajax way!
Moreover, we are going to learn new concepts about the RichFaces component framework and Ajax support.Read Build an Advanced Contact Manager using JBoss RichFaces 3.3: Part 1 in full
In this article by Patrick Felicia, Author of Getting Started with Unity, we will bring the game to life by animating objects and characters, and by giving opponents some levels of artificial intelligence to challenge the player. We will also learn how to create animations in Unity3D using built-in functionalities (for example, Mecanim).
After completing this article, we will be able to:
- Understand how to animate objects and create custom animation based on Unity3D's built-in animations
- Include these animations in the game and control them through scripting
- Use Unity3D's built-in Mecanim system to animate existing characters
You may now be asking yourself, "I've downloaded the CryENGINE 3 SDK. Now how do I start making games with it?" Such a question has far-reaching implications and is awfully difficult to answer! So in my attempt to answer this question, let's create our own game together, in a short amount of time, using some of the functions and entities that the CryENGINE 3 SDK gives to us straight out of the box.
In this article by Sean Tracy and Paul Reindell, authors of CryENGINE 3 Game Development: Beginner's Guide, we will be:
- Beginning with our first example using out of the box features of the engine
- Creating and sculpting terrain for a new level, from scratch
- Creating and using terrain texture layers
- Creating vegetation groups and applying them to your level
- Creating and setting a basic time of day to light our level
This article is by Kevin Cardwell, the author of BackTrack – Testing Wireless Network Security.This article introduces the reader to the way in which hackers typically break into networks.
In this article, we will discuss how hackers attack and breach wireless security. We do this to understand the various methods of attacking so that we can defend against them. There are a number of wireless attacks to discuss on wireless. An important point to understand is that attackers will follow a process and methodology when they attempt an attack, and the way to defend against this is to stop information from getting to the potential attacker. This can be a challenge when it comes to wireless. We group the attacks into several different categories. They are listed in the following table:
Probing and network discovery
Denial of Service
Rogue access point
The adoption of Business Process Management (BPM) is increasingly becoming one of the most popular approaches for boosting overall organizational excellence. Built on Oracle's SOA (Service Oriented Architecture) Suite infrastructure, BPM Suite 11g provides enhanced support for application integration services and business events, Web 2.0 and E2.0 style collaborations, and high scalability. It is a full-featured, enterprise-grade BPMS that has sufficient easy-to-use features to make it also suitable for small departmental quick-win projects.
This article by Heidi Buelow, Manoj Das, Manas Deb, Prasen Palvankar and Meera Srinivasan, authors of the book Getting Started with Oracle BPM Suite 11gR1, provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes the steps involved in modeling the Sales Quote Process.Read BPMN 2.0 Concepts and The Sales Quote Process in full
In the previous article, Human Interactions in Business Processes, we learnt about the the basic human workflow concepts, features, and architecture. Then discussed the Human Task service component.
In this article, by Matjaz B. Juric & Marcel Krizevnik, authors of WS-BPEL 2.0 for SOA Composite Applications with Oracle SOA Suite 11g, we will learn about BPEL4People.
We will specifically cover:
- Brief look at WS-HumanTask
- Brief look at BPEL4People
In this article, by Matjaz B. Juric, authors of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will cover the following topics:
- Long-running processes and microflows
- Overview of BPEL activities
- BPEL extensions
- Assembly diagram
BPEL processes are the new generation of workflow. It provides IT with an automated framework for enterprise-wide business processes. Monitoring BPEL processes is important for business analysts and administrators to maintain business visibility and resolve problems quickly. This article by Narayan Bharadwaj, author of BPEL Management with Oracle Enterprise talks about viewing deployed BPEL processes and their constituent partner links. Further, monitoring of BPEL processes and partner links using a combination of metrics and synthetic tests is covered.
In this article we will cover:
- Step-by-step exercises:
- Navigating to the BPEL PM target home page
- Navigating to the BPEL process home page
- Creating the BPEL process aggregate service
- Creating a SOAP test to monitor a partner link
- Creating a SOAP test to monitor a BPEL process
- Testing the SOAP tests
In a university, large class sizes limit class discussions and individual attention, while travel budgets limit the number of professional conferences where faculty can present. In this article by Erik Rose, author of the book Plone 3 for Education, we will set up blogs and forums to counter both problems—giving students more class interaction and helping faculty build professional prominence. We'll find the best Plone blog products and explore practical suggestions of how to use blogs in the classroom. We'll also take the undisputedly top forum product for a spin and see how to use it to let students support each other, saving office hours and after-school help for those who need them most.Read Blogs and Forums using Plone 3 in full
In this article by Lee Jordon, we are focusing on Google analytics and search engine optimization techniques that work best for blogs. They are as follows:
- Analyzing Navigation
- Optimizing your Landing Page
- Optimizing On-site
- Optimizing Off-site
Lets look at the specific uses of CMSs, and evaluate a few of them. In this article by Nirav Mehta, we will take a look at top blog CMSs.
We will also :
- Learn about different blog CMSs
- Evaluate how to perform typical content management operations using the top three blog CMSs
- Review flexibility and extensibility
- Consider the other options available
In this article by Adam Watson, the author of Learning Modernizr, we will look into the basics of blocking versus non blocking scripts. We take help of several topics to cover this section.
In this article we will cover:
The async attribute
Blocking to allow shimming
The section frames
In this three-part article by Magnus Mischel, we will look at some of the most common attacks that are being carried out against web applications and servers today. Knowing the anatomy of these attacks is the first step in understanding how they can be blocked, so we will first seek to understand the details of the attacks, and then see how they can be blocked using ModSecurity.Read Blocking Common Attacks using ModSecurity 2.5: Part 1 in full