This article by Sudheer Jonna, author of Learning PrimeFaces Extensions Development, provides a basic introduction for newly created advanced components, improved components along with the useful converters, validators, utility functions, and maven plugins to make the web development easier. After that, it explorers the basic input and advanced dynamic form components, commonly used input components and their features, InputNumber component, KeyFilter component, TriStateCheckbox and TriStateManyCheckbox, TimeLine component, MasterDetail component and its various features, and introduces the exporter component and its features.Read Components of PrimeFaces Extensions in full
This article by Robert Varkonyi, author of Drupal Rules How-to, explains the benefits of using Components by creating a Condition that can be re-used in other rule configurations.
In this scenario, we want to perform some action when a node is being commented on. But we only want to execute the action if the node was not created by the super admin (that is, user 1) and the node is either an article, or has an image field (field_image).Read Components - Reusing Rules, Conditions, and Actions in full
Unity works using a popular and common approach for game development, which is called the component-based architecture. This approach is widely used in software development to make things more reusable and easier to manage.
Let us talk about the way things are organized in Unity in this article by Sergey Mohov, the author of Practical Game Design with Unity and Playmaker.Read Component-based approach of Unity in full
Handbrake is considered the Swiss Army knife of video conversion tools. Running on the three major operating system platforms, Handbrake can open a huge variety of formats, including common ones that others can't handle (like the titles in the MPEG TS structure of a DVD). Handbrake outputs to a small selection of efficient formats, including H.264/MPEG-4 AVC, MPEG-4 ASP and Theora video. It has advanced features including chapter marking, subtitle inclusion and audio selection, plus filters for optimising video. On Linux, Handbrake can make use of the libdvdcss2 library to decrypt CSS-protected DVDs in-place during encoding, saving the need to use DVD Decrypter or another tool, usually through Wine. This article by Delan Azabani will guide you through the process for building Handbrake, installing it and converting video with it.Read Compiling and Running Handbrake in Ubuntu in full
In this article by Wolfgang Niefert, we will cover the following topics:
- Service workflow (from setup to operation) – In this section, we will configure the service module in a step-by-step manner.
- Limitations of the SAP service module – Based on the available features, we will discuss potential limitations of the service module.
- Evaluate potential add-ons for service – Add-ons which are proven to enhance the service module features, are available to overcome the limitations.
In this article by Wolfgang Niefert, we will take a closer look at the service module to evaluate potential actions that are triggered, based on service-related information. The concept introduced here will utilize the service module features to establish a guaranteed response time for customers. You will see that there are various angles to look at service. In addition to its more traditional view, service can be used to establish a service-level-type management for customers and the related sales opportunities. Basically, the service module can be used as a sophisticated alert system.Read Competitive Service and Contract Management in SAP Business ONE Implementation: Part 1 in full
MySQL introduced cursor in its release 5. You create a cursor to define a set of rows from one or more table that you want to access row-by-row sequentially. If your need is really to access the rows one at a time then use cursor. But a lot of data processing is actually set processing, and set processing is what relational database is best for.
This article by Djoni Darmawikarta compares cursor approach and set approach using various examples.Read Comparing Cursor and Set Approaches in Processing Relational Data in full
Voice Internet Protocol (VoIP) Telephony refers to the technology used for making telephone calls over the Internet. The two major technologies used to implement VoIP telephony are Asterisk and OpenSER. This article by Flavio E. Goncalves compares Asterisk and OpenSER topic by topic and shows the differences between them.Read Comparing Asterisk and OpenSER in full
In this article by Gaurav Vaish, author of Getting Started with NoSQL, we will do a comparative study of the various products available in the market for implementing NoSQL—both open source as well as commercial.
Specifically, we compare the following products:
Amazon SimpleDB: http://aws.amazon.com/simpledb
Google Datastore: http://developers.google.com/appengine
This article is structured such that we first explore each point for comparison and then compare it across the products.Read Comparative Study of NoSQL Products in full
In this article, by Gorgi Kosev and Mite Mitreski, the authors of HTML5 Data and Services Cookbook, we're going to cover the following topics:
In this Article, we're going to cover the following topics:
- Creating an HTTP GET request to fetch JSON
- Creating a request with custom headers
- Versioning your API
- Fetching JSON data with JSONP
- Reading XML data from the server
- Using the FormData interface
- Posting a binary file to the server
- Creating an SSL connection with Node.js
- Making real-time updates with Ajax Push
- Exchanging real-time messages using WebSockets
This article deals with the communication between the client and the server. The recipes in this article describe how to use the JPA in the server side and Data Transfer Objects (DTO) in the client side. It discusses how the GWT RPC mechanism allows the server and the client to pass Java objects back and forth.
In this article by Shamsuddin Ahammad, author of Google Web Toolkit 2 Application Development Cookbook, we will cover:
- Creating DTO classes
- Mapping entity classes and DTOs
- Creating a GWT RPC service
- Defining an RPC method to persist an object
- Calling an RPC method from a client UI
One can imagine many scenarios where Dynamics CRM either publishes data to BizTalk Server or queries BizTalk-exposed service endpoints. For instance, when a customer requests a refund for a defective product, the call center agent may record this request in Dynamics CRM. After the phone call is over, Dynamics CRM should send a message to a returns processing system which handles the crediting of a customer's account. In another scenario, BizTalk Server may be the host of a data aggregation service which queries three enterprise systems that store "customer" data and aggregates the responses. Dynamics CRM may want to execute that service when a call center agent views a customer record so that they get a fuller picture of that customer's interactions with the company.
In this article by Richard Seroter, author of Microsoft BizTalk 2010: Line of Business Systems Integration, we will see how Dynamics CRM sends data to BizTalk Server.Read Communicating from Dynamics CRM to BizTalk Server in full
In the previous part of this artice by Florian Rommel, we discussed software toolkits for your DCs and administration and diagnosing AD problems. In this part, things included are monitroing your AD with two utilities: Sonar and Ultrasound.Read Common Recovery Tools in Active Directory: Part 2 in full
Some of the things we will go through in this two-part article by Florian Rommel maybe not exactly be a requirement for the recovery process, but would still be useful to know and easier to understand when referenced.
In this part, things include what specific toolkits you should have installed, or at least have ready to be installed, on your DCs. We will also look at some tools for diagnosing problems, such as DcDiag.exe and NetDiag.exe to how you can use them to try and fix small issues.
We will first start with the software toolkits.Read Common Recovery Tools in Active Directory: Part 1 in full
In this article by Osama Oransa, author of Java EE 7 Performance Tuning and Optimization, we will discuss the most common performance issues, classify them, describe the symptoms, and analyze the possible root causes.
Let's now go through the most common performance issues in enterprise applications that we could face during performance troubleshooting. For each issue, we will define the issue, describe it and its symptoms, and give examples. Let's begin with classifying the most common issues and organizing them into different categories.Read Common performance issues in full
In this article by Amit Daliot, the author of Instant Axure RP Starter [Instant], we will learn how to prototype some commonly used UI design patterns using the key features of Axure. Axure prototyping enables you to create accurate, high fidelity mockups of applications and web services quickly and with no coding skills. By the end of this article, you will be able to work more efficiently with Axure and will be able to deliver detailed designs much faster.
Read Common design patterns and how to prototype them in full
In this article by Steve Liles, the author of Asynchronous Android, we will take a look at AsyncTask which was introduced in Android at API level 3, Cupcake, with the express purpose of helping developers to avoid blocking the main thread. The Async part of the name of this class comes from the word asynchronous, which literally means not occurring at the same time. AsyncTask is an abstract class, and as such, must be subclassed for use. At the minimum, our subclass must provide an implementation for the abstract doInBackground method, which defines the work that we want to get done off the main thread.
As with any powerful programming abstraction, AsyncTask is not entirely free from issues and compromises.Read Common AsyncTask issues in full
This article by Jonas X.Yuan, author of Liferay Portal Systems Development will introduce user management and password policy first. Then it will address authentication and authorization. LDAP and SSO integration will be introduced afterwards. Tracking and auditing services API will be addressed in detail after this. Finally, it will address scripting engine, polling, web services, WSRP, and the OSGi framework.
By the end of this article, you will have learned about the following:
- User management
- Password policy
- Authentication and authorization
- LDAP and SSO
- Tracking and auditing
- Rules engine and reporting engine
It can be difficult to combine multiple different frameworks into the same solution while working with new technologies. This article will focus on how to combine Silverlight 4, Windows Azure, and a WCF 4.0 (Windows Communication Foundation) service together.
In this article by David Burela, author of Microsoft Silverlight 5 and Azure Enterprise Integration, we will discuss the following topics:
- Combining Silverlight and Windows Azure projects
- Consuming an Azure-hosted WCF service within a Silverlight application
- Configuring the number of web roles