Article Network

Bringing Your Game to Life with AI and Animations

by Patrick Felicia | September 2013 | Games Open Source

In this article by Patrick Felicia, Author of Getting Started with Unity, we will bring the game to life by animating objects and characters, and by giving opponents some levels of artificial intelligence to challenge the player. We will also learn how to create animations in Unity3D using built-in functionalities (for example, Mecanim).

After completing this article, we will be able to:

  • Understand how to animate objects and create custom animation based on Unity3D's built-in animations
  • Include these animations in the game and control them through scripting
  • Use Unity3D's built-in Mecanim system to animate existing characters
Read Bringing Your Game to Life with AI and Animations in full

Breaking Ground with Sandbox

by Paul Reindell Sean Tracy | October 2012 | Beginner's Guides Games

You may now be asking yourself, "I've downloaded the CryENGINE 3 SDK. Now how do I start making games with it?" Such a question has far-reaching implications and is awfully difficult to answer! So in my attempt to answer this question, let's create our own game together, in a short amount of time, using some of the functions and entities that the CryENGINE 3 SDK gives to us straight out of the box.

In this article by Sean Tracy and Paul Reindell, authors of CryENGINE 3 Game Development: Beginner's Guide, we will be:

  • Beginning with our first example using out of the box features of the engine
  • Creating and sculpting terrain for a new level, from scratch
  • Creating and using terrain texture layers
  • Creating vegetation groups and applying them to your level
  • Creating and setting a basic time of day to light our level
Read Breaking Ground with Sandbox in full

Breaching Wireless Security

by Kevin Cardwell | June 2013 | Networking & Telephony Open Source

This article is by Kevin Cardwell, the author of BackTrack – Testing Wireless Network Security.This article introduces the reader to the way in which hackers typically break into networks.

In this article, we will discuss how hackers attack and breach wireless security. We do this to understand the various methods of attacking so that we can defend against them. There are a number of wireless attacks to discuss on wireless. An important point to understand is that attackers will follow a process and methodology when they attempt an attack, and the way to defend against this is to stop information from getting to the potential attacker. This can be a challenge when it comes to wireless. We group the attacks into several different categories. They are listed in the following table:

Probing and network discovery


Denial of Service


Rogue access point

Read Breaching Wireless Security in full

Branding SharePoint with Device Channels and Design Packages

by John Chapman | January 2014 | Cookbooks Enterprise Articles

In this article by John Chapman, author of the book SharePoint 2013 WCM Advanced Cookbook, we will cover packaging out-of-the-box branding elements and targeting the branding for specific devices. We will cover the following recipes:

  • Creating a device channel for mobile devices
  • Applying a master page to a device channel
  • Creating and exporting a design package
  • Importing and applying a design package
  • Importing a design package to all site collections with PowerShell
  • Listing the device channel master pages
Read Branding SharePoint with Device Channels and Design Packages in full

BPMN 2.0 Concepts and The Sales Quote Process

by Heidi Buelow Manas Deb Manoj Das Meera Srinivasan Prasen Palvankar | September 2010 | Enterprise Articles Oracle

The adoption of Business Process Management (BPM) is increasingly becoming one of the most popular approaches for boosting overall organizational excellence. Built on Oracle's SOA (Service Oriented Architecture) Suite infrastructure, BPM Suite 11g provides enhanced support for application integration services and business events, Web 2.0 and E2.0 style collaborations, and high scalability. It is a full-featured, enterprise-grade BPMS that has sufficient easy-to-use features to make it also suitable for small departmental quick-win projects.

This article by Heidi Buelow, Manoj Das, Manas Deb, Prasen Palvankar and Meera Srinivasan, authors of the book Getting Started with Oracle BPM Suite 11gR1, provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes the steps involved in modeling the Sales Quote Process.

Read BPMN 2.0 Concepts and The Sales Quote Process in full


by Marcel Krizevnik Matjaz B. Juric | September 2010 | BPEL Enterprise Articles SOA Oracle

In the previous article, Human Interactions in Business Processes, we learnt about the the basic human workflow concepts, features, and architecture. Then discussed the Human Task service component.

In this article, by Matjaz B. Juric & Marcel Krizevnik, authors of WS-BPEL 2.0 for SOA Composite Applications with Oracle SOA Suite 11g, we will learn about BPEL4People.

We will specifically cover:

  • Brief look at WS-HumanTask
  • Brief look at BPEL4People
Read BPEL4People in full

BPEL Support in WebSphere

by Matjaz B. Juric | October 2010 | BPEL Enterprise Articles IBM SOA

In this article, by Matjaz B. Juric, authors of WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will cover the following topics:

  • Long-running processes and microflows
  • Overview of BPEL activities
  • BPEL extensions
  • Assembly diagram
Read BPEL Support in WebSphere in full

BPEL Process Monitoring

by Narayan Bharadwaj | August 2010 | Enterprise Articles Oracle

BPEL processes are the new generation of workflow. It provides IT with an automated framework for enterprise-wide business processes. Monitoring BPEL processes is important for business analysts and administrators to maintain business visibility and resolve problems quickly. This article by Narayan Bharadwaj, author of BPEL Management with Oracle Enterprise talks about viewing deployed BPEL processes and their constituent partner links. Further, monitoring of BPEL processes and partner links using a combination of metrics and synthetic tests is covered.

In this article we will cover:

  • Challenges
  • Solution
  • Step-by-step exercises:
    • Navigating to the BPEL PM target home page
    • Navigating to the BPEL process home page
    • Creating the BPEL process aggregate service
    • Creating a SOAP test to monitor a partner link
    • Creating a SOAP test to monitor a BPEL process
    • Testing the SOAP tests
Read BPEL Process Monitoring in full

Bootstrap 3.0 is Mobile First

by Alexandre Magno | December 2013 | Open Source

This article by Alexandre Magno, the author of Mobile First bootstrap, has discussed Twitter Bootstrap framework's upcoming version, Mobile First. This milestone is not just technical, it's strategic. It follows the current paradigm of design for the Web. It's a design for the future.

Read Bootstrap 3.0 is Mobile First in full

Bootstrap 3 and other applications

by Bass Jobsen | April 2014 | Open Source Web Development

This article by Bass Jobsen, the author of Less Web Development Essentials, introduces Bootstrap and then talks about how you can use Bootstrap's Less files, and what modifications can be done on the same.

Read Bootstrap 3 and other applications in full

Boost Your search

by Surendra Mohan | March 2014 | Open Source

In this article, by Surendra Mohan, the author of Apache Solr High Performance, we will learn about the dismax query parser in detail. Also, we will go through what are boost queries.

Read Boost Your search in full

Blogs and Forums using Plone 3

by Erik Rose | May 2010 | Content Management Open Source

In a university, large class sizes limit class discussions and individual attention, while travel budgets limit the number of professional conferences where faculty can present. In this article by Erik Rose, author of the book Plone 3 for Education, we will set up blogs and forums to counter both problems—giving students more class interaction and helping faculty build professional prominence. We'll find the best Plone blog products and explore practical suggestions of how to use blogs in the classroom. We'll also take the undisputedly top forum product for a spin and see how to use it to let students support each other, saving office hours and after-school help for those who need them most.

Read Blogs and Forums using Plone 3 in full

Blogger: Improving Your Blog with Google Analytics and Search Engine Optimization

by | August 2008 | Content Management Java

In this article by Lee Jordon, we are focusing on Google analytics and search engine optimization techniques that work best for blogs. They are as follows:

  • Analyzing Navigation
  • Optimizing your Landing Page
  • Optimizing On-site
  • Optimizing Off-site
Read Blogger: Improving Your Blog with Google Analytics and Search Engine Optimization in full

Blog CMS

by Nirav Mehta | April 2009 | Content Management Open Source PHP

Lets look at the specific uses of CMSs, and evaluate a few of them. In this article by Nirav Mehta, we will take a look at top blog CMSs.
We will also :

  • Learn about different blog CMSs
  • Evaluate how to perform typical content management operations using the top three blog CMSs
  • Review flexibility and extensibility
  • Consider the other options available
Read Blog CMS in full

Blocking versus Non blocking scripts

by Adam Watson | February 2013 | Open Source Web Development

In this article by Adam Watson, the author of Learning Modernizr, we will look into the basics of blocking versus non blocking scripts. We take help of several topics to cover this section.

In this article we will cover:

  • The async attribute

  • Blocking to allow shimming

  • Adding navigation

  • The section frames

Read Blocking versus Non blocking scripts in full

Blocking Common Attacks using ModSecurity 2.5: Part 1

by Magnus Mischel | November 2009 | Linux Servers Open Source

In this three-part article by Magnus Mischel, we will look at some of the most common attacks that are being carried out against web applications and servers today. Knowing the anatomy of these attacks is the first step in understanding how they can be blocked, so we will first seek to understand the details of the attacks, and then see how they can be blocked using ModSecurity.

Read Blocking Common Attacks using ModSecurity 2.5: Part 1 in full

Blender Engine : Characters

by Victor Kuller Bacone | November 2012 | Games

Blender is an open source, cross platform suite of tools for 3D creation, capable of modeling, rendering, and animating 3D environments.Blender Game Engine is the part of the Blender 3D editor used to create actual 3D video games. It’s the ideal entry level game development environment because you don’t even need to learn to program. Create a complete game using Bender’s innovative logic bricks.

In this article by Victor Kuller Bacone, author of Blender Game Engine: Beginner’s Guide, we'll:

  • Learn how to create a library
  • Involve enemies in the game
  • Create a meeting point for the enemy and player
Read Blender Engine : Characters in full

Blender Books from Packt

by | March 2011 | Cookbooks RAW Open Source

A quick round-up of the latest Blender books published by Packt

Read Blender Books from Packt in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software