It doesn't matter how much time you invest in Android design, or even how careful you are when programming, mistakes are inevitable and bugs will appear.
In this article we will take a look at adding some basic functionality to the user interface.Read Android Application Testing: Adding Functionality to the UI in full
As the computing power of mobile devices has increased, so has their ability to play and record a variety of media such as audio and video. Android provides some useful tools for managing multimedia.
In this article by Kyle Merrifield Mew, author of Android 3.0 Application Development Cookbook, we will cover the following recipes:
- Playing an audio file from within an application
- Playing back video from external memory
- Playing multiple sounds with a SoundPool
Menus are an essential part of almost any operating system. On mobile systems where screen real estate is limited, they play an even more important role. Android provides similar mechanisms for menus as it does for other visual elements, making it possible to separate them from application code by the use of XML.
In this article by Kyle Merrifield Mew, author of Android 3.0 Application Development Cookbook, we will cover the following topics:
- Creating and inflating an options menu
- Designing Android compliant menu icons
- Building a context sensitive menu
- Handling menu selections
- Building menu groups of checkable items
- Applying shortcut keys and submenus
One of the most remarkable aspects of modern smartphones is the way they can detect their location either through a Global Positioning System (GPS), or cell towers and WiFi signal strength; and more often than not, applications use both.
In this article by Kyle Merrifield Mew, author of Android 3.0 Application Development Cookbook, we will cover the following topics:
- Detecting a device's location
- Listening for location changes
- Setting up Google Maps
- Zooming in on a MapView
- Setting a map's location with a GeoPoint
- Marking a location on a map with an overlay
This article by Dmitry Dulepov describes TYPO3 extensions from the developer's point of view. After reading this article, the reader will have basic knowledge of extension structure, files, and how extensions interact with TYPO3. This knowledge is necessary for extension planning and implementation.Read Anatomy of TYPO3 Extension in full
WordPress is a popular content management system (CMS), most renowned for its use as a blogging / publishing application. According to usage statistics tracker, BuiltWith (http://builtWith.com), WordPress is considered to be the most popular blogging software on the planet—not bad for something that has only been around officially since 2003.
Before we develop any substantial plugins of our own, let's take a few moments to look at what other people have done, so we get an idea of what the final product might look like. By this point, you should have a fresh version of WordPress installed and running somewhere for you to play with. It is important that your installation of WordPress is one with which you can tinker. In this article by Brian Bondari and Everett Griffiths, authors of WordPress 3 Plugin Development Essentials, we will purposely break a few things to help see how they work, so please don't try anything in this article on a live production site.Read Anatomy of a WordPress Plugin in full
Having some skill with Tshark and analyzing our network on a regular basis can help us greatly in identifying multiple security issues. Besides the network attacks previously seen, we can intelligently use Tshark to investigate security incidents whose origin is unknown. In this article by Borja Merino, author of Traffic Analysis with Tshark How-to, we will discuss a couple of examples, data exfiltration by a malicious user and an internal network intrusion.Read Analyzing network forensic data (Become an expert) in full
This article by Srinath Perera the author of Instant MapReduce Patterns – Hadoop Essentials How-to, will explain how to use MapReduce to calculate frequency distribution of the number of items brought by each customer. Then we will use gnuplot, a free and powerful, plotting program to plot results from the Hadoop job.Read Analytics – Drawing a Frequency Distribution with MapReduce (Intermediate) in full
When Sakai was first designed, the specifics of the majority of the connected systems were not knowable. To adapt to these tough circumstances, Sakai supplies web services that are easy to hook into or write. Sakai exposes services for creating and maintaining users, sites, and groups. These services are easily extensible to include any part of the Sakai framework.
This article by Alan Berg, author of Sakai CLE Courseware Management, explains the two main types of web service, Simple Object Access Protocol (SOAP) and Representational State Transfer (REST). It also covers the already-existing web services and describes how to hook into them. If you follow the examples, you will be able to write and deploy your first service. Lastly, this article includes a few simple client-side Perl scripts that create new users, employing both the SOAP and RESTful approaches.Read An Overview of Web Services in Sakai in full
Java Enterprise Edition can be considered to be nothing more than a set of specifications, or interfaces, for which service providers are required to provide implementations. While it is the actual implementation that does all the work, these specifications ensure that each implementation can assume that all its other collaborating pieces work as described by their interfaces. In theory, this allows complex software platforms (such as application servers) to be assembled from constituent implementations, each of which is sourced from a different vendor.
This article by Damodar Chetty introduces the reader to the Tomcat container. All the components of Tomcat are described with just enough detail, so as not to overwhelm the reader with too much information.Read An Overview of Tomcat 6 Servlet Container: Part 1 in full
Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to become a full-featured scripted programming language capable of creating elegant, cross-platform solutions.
In this article by Bert Wheeler, author of Tcl/Tk 8.5 Programming Cookbook, we will cover the following topics:
- The Tcl shell
- Writing to the Tcl console
- Mathematical expressions
- Tcl expr operands
- Tcl expr operators
- Mathematical functions
- Computing mathematical expressions
- Referencing files in Tcl
- Launching a Tcl script
NPM is a package management and distribution system for Node. It has become the de-facto standard for distributing modules (packages) for use with Node. Conceptually it's similar to tools like apt-get (Debian), rpm/yum (Redhat/Fedora), MacPorts (Mac OS X), CPAN (Perl), or PEAR (PHP). It's purpose is publishing and distributing Node packages over the Internet using a simple command-line interface. With npm you can quickly find packages to serve specific purposes, download them, install them, and manage packages you've already installed. npm defines a package format for Node largely based on the CommonJS Package spec.
In this article by David Herron, author of Node Web Development, we will take a look at the npm package management system.Read An Overview of the Node Package Manager in full
Commitment Control is an optional feature of PeopleSoft used for enforcing budget control over an organization's spending. It enables an organization to perform what is known as "encumbrance accounting", or commitment accounting. Using this feature, organizations can define budgets for various categories of their spending and track each spending transaction against available budget amounts. Although commitment control configurations are part of the General Ledger module, it spans many more modules such as Purchasing, Accounts Payable, Expenses, Billing, Accounts Receivable, and so on, which are responsible for creating transactions for spending as well as generating revenue.
In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll cover the following important topics:
- Understanding commitment control
- Commitment control configurations
Interactive Reporting is an extremely robust and powerful business intelligence tool providing ad-hoc querying, data analysis, dashboards, and other reporting capabilities. Business analysts access the software through the EPM Workspace, a central location for viewing and managing content across all of the Hyperion products. The product is extremely flexible and provides analysts with the ability to quickly analyze data and produce deliverables. The software provides a consistent platform for managing content, where documents can be customized, saved, and shared across an organization. The focus of this article is to provide an overview of the Interactive Reporting Web Client and EPM Workspace, providing the business analyst with the skills necessary to work with the tool on a daily basis.
The content in this article by Edward J. Cody, author of The Business Analyst's Guide to Oracle Hyperion Interactive Reporting 11, covers:
- Navigating the EPM Workspace
- Installing the Web Client
- An Overview of the Web Client interface
- Methods for opening and saving documents
- Methods for importing and provisioning files
- Steps to edit file properties
In this article by Muneeb A. Siddiqui, author of Oracle EBS supply chain management R12, we will see how pricing engine works for Oracle E-Business Suite, how we can cater different scenarios of discounts and surcharges using Oracle Advanced Pricing, and how a price list for an item is created and how it effects the modules which are integrated and associated with Oracle Advanced Pricing. In this article, we will also see how qualifiers and modifiers are efficiently used to capture business scenarios as well as how to setup Oracle Advanced Pricing.Read An Overview of Oracle Advanced Pricing in full
Delivering business solutions is more than just product play. Software is often viewed as the enabler; however, the key to success is how the solution is implemented and how the implementations are managed. With this as the background, Microsoft has developed Sure Step as the full lifecycle methodology for the Microsoft Dynamics solutions portfolio. In this article, we introduce the concept of Methodology and its importance in the selection and implementation of ERP/CRM solutions. A faulty selection process can derail any solution deployment, and it is important for the readers to understand what they can do to prevent this.
In this article by Chandru Shankar and Vincent Bellefroid, authors of Microsoft Dynamics Sure Step, we will introduce the concepts and definitions. We will also provide an overview of Microsoft Dynamics Sure Step, and the different aspects of the methodology that help both the implementer and the customer.Read An Overview of Microsoft Sure Step in full
In this article, we will briefly review the Joomla!/VirtueMart file structure. We will then continue to explain the presentation framework of Joomla! and VirtueMart. A high-level view of the VirtueMart engine will be presented and we will see how the VirtueMart theme and template fits in the whole system. After that, we will be able to understand the various ways to customize the VirtueMart shop and provide a list of items we need to consider before heading on a customization project.
Briefly, in this article by Joseph Kwan, author of Joomla! VirtueMart 1.1 Theme and Template Design, we will cover:
- Navigating through the Joomla!/VirtueMart directories
- Structure of the Joomla! URL path
- Joomla! presentation framework
- VirtueMart presentation framework
- Roles of VirtueMart themes and templates
- Ways to customize VirtueMart
In this article by Alexandre Alves,Robin J. Smith and Lloyd Williams, authors of Getting Started with Oracle Event Processing 11g, you will be introduced to the basic concepts of Complex Event Processing ( CEP ), its impact today on businesses across all industries, and the key artifacts that together constitute an Event-Driven Solution Platform. Some of the topics we will cover are as follows:
What is event processing
Relating this to a business in computing terms
Use case: A solution for customer problems
Key elements of event stream processing
Event processing languages and extensibility
Holistic event-driven and service-orientated architectures
Predicting an event
Security is a process that requires the integration of security into business processes to ensure enterprise risk is minimized to an acceptable level. Security as a process is an approach that highlights the integration of security and business initiatives to reduce the security impact of implementations and changes to the enterprise environment. This article by Aaron Woody, author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise, will introduce the concept of using risk analysis to drive security decisions.Read An Introduction to Risk Analysis in full