Every commercial PBX system has its own set of advanced features that are activated by key commands, also known as vertical service activation codes. In this article by Kerry Garrison, we will look at the standard and advanced features of trixbox CE. We will even look at how to add our own custom features to the system.Read trixbox CE Functions and Features in full
In this article by Rihards Olups, author of Zabbix 1.8 Network Monitoring, we will discuss triggers in detail which will include Trigger dependencies, Constructing trigger expressions, Event details, and Event generation and hysteresis.Read Triggers in Zabbix 1.8 in full
In this article we will be specifically covering:
- The Error object
- The RangeError object
- The ReferenceError object
- The TypeError object
- The SyntaxError object
- The URIError object
- The EvalError object
This tragic hero is the translation engine, which will be the subject of this article written by Matt Butcher.
Here are the things we will cover in this article:
- Get our bearings in the drupal.js library
- Enable multi-language capabilities in Drupal
- Learn the translation functions
This article by Andy Walker, author of SDL Trados Studio – A Practical Guide, describes the basic process of opening a document in SDL Trados Studio and translating it.Read Translating a file in SDL Trados Studio in full
This article created by Stefan Bauer author of Getting Started with Amazon Redshift, gets into some of the specifics and details you will need to get up and running with . As with most of the Amazon products you have used in the past, there are just a few preliminary things to take care of. You need to have signed up for the Redshift service on the Amazon account you will be using. Although these keys are not specific to Redshift, be sure to hang on to both your public and secret key strings from your user account. Those keys will be labeled Access Key and Secret Key. You can view the Access Key public portion from the user security credentials on the Security Credentials tab. However, if you do not capture the secret key when you create the keys, it cannot be recovered and you will need to generate a new key pair. You will need these when we start talking about loading data and configuring the command-line tools. Once you have the permissions for your account, the process to create the cluster is a wizard-driven process that you can launch from your Amazon Redshift management console.Read Transition to Readshift in full
In this article by Michal Bali, the author of Drools JBoss Rules 5.X Developer's Guide, we will look at Almost any rewrite of an existing legacy system needs to do some kind of data transformation with the old legacy data before it can be used in the new system. It needs to load the data and transform them so that they meet the requirements of the new system and finally store them. This is just one example of where data transformation is needed.
Drools can help us with this data transformation task as well. Depending on our requirements it might be a good idea to isolate this transformation process in the form of rules. The rules can be reused later, maybe when our business will expand and we'll be converting data from a different third-party system. Of course, other advantages of using rules apply.
If performance is the most important requirement (for example, all data has to be converted within a specified time frame), rules may not be the ideal approach. Probably, the biggest disadvantage of using rules is that they need the legacy data in memory, so they are best suited to more complex data transformation tasks.
However, consider carefully if your data transformation will grow in complexity as more requirements are added.When writing these transformation rules, care should be taken not to confuse them with validation rules. In a nutshell, if a rule can be written working just with the domain model, it is most likely a validation rule. If it uses concepts that cannot be represented with our domain model, it is probably a transformation rule.Read Transforming Data in full
This article by Scott Cranton and Jakub Korab, the authors of Apache Camel Developer's Cookbook, introduces various ways in which Camel allows us to transform or convert between and manipulate common message formats such as Java objects, XML, and JSON. The following ways are discussed in this article:
- Transforming using a Simple Expression
- Transforming inline with XQuery
- Transforming with XSLT
- Transforming from Java to XML with JAXB
- Transforming from Java to JSON
- Transforming from XML to JSON
The Export and Import Wizard is an extremely useful tool for transferring data. In fact it is the simplest tool to copy over data from one database to another and to create data transfer packages that can be persisted. Data can be transferred between SQL Servers (between versions of SQL Servers for example) as well as between even two non-Microsoft databases. Both Microsoft and proprietary data source providers are available to connect to many different database products.
In this article by Dr. Jayaram Krishnaswamy, we will be transferring data from an MS Access database to a database on SQLServer 2008. Both the source of data and the destination database are on the same machine, in this case a computer box running Windows XP Pro. There are two versions of the Import and Export Wizard and in this example the 32 bit version is used.Read Transferring Data from MS Access 2003 to SQL Server 2008 in full
Microsoft Dynamics GP 2013 is a sophisticated Enterprise Resource Planning system used throughout the world. Implementing Dynamics GP for an organization can be a daunting task, requiring thorough planning and understanding of the available features and options. This article provides guidance for the planning, installation, and setup of Microsoft Dynamics GP 2013 with examples, advice, step-by-step guides, illustrations, and links to useful resources.
Most likely, you have already started training users. For many companies training is an ongoing process. In this article by Victoria Yudin, the author of Microsoft Dynamics GP 2013 Implementation, you will go over some ideas for planning your initial, as well as ongoing, training. We will also discuss tools available from Microsoft for your Dynamics GP system. Finally, some troubleshooting tips and additional resources will be listed to help you maintain and get the most out of Dynamics GP.Read Training, Tools, and Next Steps in full
Packt is due to launch a new Open Source brand, into which future VirtualBox titles will be published. For more information on that launch, look here
In this article by Karen M. Tracey, author of the book Django 1.1 Testing and Debugging, we will develop a template code that can be used to include information about all of the SQL queries needed to render a page in the page itself.Read Tracking SQL Queries for a Request using Django in full
This article by Joseph Howse, author of OpenCV Computer Vision with Python introduces some of OpenCV's tracking functionality, along with the data files that define particular types of trackable objects. Specifically, we look at Haar cascade classifiers, which analyze contrast between adjacent image regions to determine whether or not a given image or subimage matches a known type. We consider how to combine multiple Haar cascade classifiers in a hierarchy, such that one classifier identifies a parent region (for our purposes, a face) and other classifiers identify child regions (eyes, nose, and mouth).
We also take a detour into the humble but important subject of rectangles. By drawing, copying, and resizing rectangular image regions, we can perform simple manipulations on image regions that we are tracking.
By the end of this article, we will integrate face tracking and rectangle manipulations into Cameo. Finally, we'll have some face-to-face interaction!
All the finished code for this article can be downloaded from my website: http://nummist.com/opencv/3923_04.zip.Read Tracking Faces with Haar Cascades in full
In this article by Alexander Dickson, the author of the book "Instant Website Touch Integration", has covered in detail about touch events. Touch events allow your website to respond to users' fingers, thus, giving a whole new dimension to foster creative user interactions. Mastering touch events allow you to make your website usable in a way not possible with the standard desktop input peripherals.Read Touch Events in full
TortoiseSVN is a free and open-source Subversion client for Microsoft Windows. It is not tied to any particular Integrated Development Environment (IDE); instead, it is a shell extension which integrates into the Windows Explorer, giving you easy access to Subversion repositories from within applications you're already familiar with. This means that it can be used with any software, and by all members of your development team. In the previous article, Working with Revision Logs in TortoiseSVN, we learnt about differences and changelists in TortoiseSVN 1.7.
In this article by Lesley Harrison, author of TortoiseSVN 1.7, we shall:
- Explore working with revision graphs
- Learn how to change views in revision graphs
- Learn how to prune trees to make the revision graph easier to understand
In this article you will get your first taste of using TortoiseSVN. This article will explain the concept of working copies and will cover how to check out a working copy, how to manage copy depth, and how to commit a copy after you have made some changes to it. This process is the nuts-and-bolts of version management and something that you will be doing a lot during your work with TortoiseSVN.
In this article by Lesley Harrison, author of TortoiseSVN 1.7, we shall:
- Learn the benefits of using a working copy
- Learn how to check out a working copy and how to check in after making changes
- See some of the more common commit log messages and learn what they mean
- Explore the repository browser
In this article, by Sandeep Kumar Patel, the author of Instant GSON, you will learn about the top features supported by the GSON library. You will also learn about how to implement these features.Read Top two features of GSON in full
This article by Nguyễn Hồng Quân, the author of Instant Geany IDE , explains that as we start to use Geany, we will realize that there is a wide variety of things we can do with it.
This article will discuss the most commonly performed tasks and how one should perform them, along with the most widely used features and plugins of Geany.Read Top Geany features you need to know about in full
This article by Christopher Tilford, author of Instant Adobe Story Starter [Instant], explains that Adobe Story has a variety of features that have been built in for your script writing convenience. There are seven features that can be considered more helpful than others. Knowledge of these will streamline your script writing process with the overall production of a project. It is vital to be aware of them.Read Top features you'll want to know about in full
In this article, by Diego Tres, the author of Instant 960 Grid System , we learn to prepare our website for the present and the future with fluid grids, fluid media, and media queries, also known as responsive web design.
In this article, we will see how to prepare our desktop-only portfolio that runs in mobile phones and tablets.Read Top Features You Need to Know About – Responsive Web Design in full
At its core, Sublime Text 2 is a text editor. However, there are many features that make it stand out from the rest of the pack.
In this article by Eric Haughee, author of Getting Started with Oracle Event Processing 11g,we will learn about the minimap, multiple cursors,Read Top features you need to know about in full