This article will introduce us to the concept of a scene graph and how we can use its functions to create complex scenes.
In this article, Felix Kerger, author of Ogre 3D 1.7, we shall:
- Learn the three basic operations in 3D space
- How a scene graph is organized
- The different 3D spaces we can operate in
So let's get on with it.Read The Ogre Scene Graph in full
An HTTP server is primarily a piece of software that will deliver web pages to clients when requested. These web pages can be anything from a simple HTML file on disk to a multicomponent framework delivering user-specific content, dynamically updated through AJAX or WebSocket. NGINX is modular, and is designed to handle any kind of HTTP serving necessary.
In this article by Dimitri Aivaloitis, author of Mastering NGINX , we will investigate the various modules that work together to make NGINX such a scalable HTTP server. The following topics are included in this article:
The HTTP core module
Using limits to prevent abuse
Streaming media files
Using NGINX with PHP-FPM
Wiring NGINX and uWSGI together
The Search pages in the Database or Table view are intended for single-table lookups. This article by Marc Delisle, covers the multi-table Query by example (QBE) feature available in the Database view.
Many phpMyAdmin users work in the Table view, table-by-table, and thus tend to overlook the multi-table query generator, which is a wonderful feature for fine-tuning queries. The query generator is useful not only in multi-table situations but also for a single table. It enables us to specify multiple criteria for a column, a feature that the Search page in the Table view does not possess.Read The Multi-Table Query Generator using phpMyAdmin and MySQL in full
Alfresco 3 is one of the most versatile open source Enterprise Content Management (ECM) platforms. This is a real open source alternative to commercial product such as Microsoft SharePoint and EMC Documentum. It is also very well designed and suitable to be customized and extended. The open source adoption allows developers to contribute on the project and that's why you can find more than 240 extensions in the Alfresco Forge.
In this article by Ugo Cei and Piergiorgio Lucidi, authors of the book, Alfresco 3 Web Services, you will learn:
- How to properly design Web Scripts using the Model-View-Controller pattern
- How to configure a Web Script for things such as authentication, transactionality, and cacheability
- How clients can request a specific response format
- How to deploy Web Scripts in Alfresco
In this article by Liran Tal, the author of the book Drupal 7 Media, mentions that in previous versions of Drupal, the basic image field type didn't exist by default nor did another facet of image handling—the Imagecache module, which enabled the management of different image pre-sets (thumbnail, large, and so on). As we've seen with the Memo content type, this is no longer the case in Drupal 7, and at least a very basic support for images that already exist.Read The Media module in full
It is time we explain some of the inner workings of Angular. Angular does some neat things for us. It saves us from having to write a bunch of boilerplate code. In this article written by Alex Knol author of the book Dependency Injection with AngularJS, we will see the magic of Angular.
Dependency Injection is baked into AngularJS and heavily used throughout. Another feature is a built-in subset of a jQuery functionality called jQLite. It contains all the necessary functions to make AngularJS run without jQuery and has the exact same interface. If jQuery is available in your application, it will be used instead. Angular also takes the burden of bootstrapping your application, which will be covered later in this article.Read The Magic in full
The article The Login Page using Ext JS by Loiane Groner, author of the book Mastering Ext JS, talks about developing a login page for an application using Ext JS.
It is very common to have a login page for an application, which we can use to control access to the system by identifying and authenticating the user through the credentials presented by him/her. Once the user is logged in, we can track the actions performed by the user. We can also restrain access of some features and screens of the system that we do not want a particular user or even a specific group of users to have access to.
In this article, we will cover:
- Creating the login page
- Handling the login page on the server
- Adding the Caps Lock warning message in the Password field
- Submitting the form by pressing the Enter key
- Encrypting the password before sending to the server
In this article by John Adams, author of Learning Kendo UI Web Development, we will cover the following topics:
Basics of MVVM
Simple data binding
Creating the view
Creating the Model and View-Model
Observable data binding
Adding data dynamically
Data-bind properties for Kendo MVVM
In this article by Biru Chattopadhayay, author of Getting Started with Oracle Tuxedo,we will discuss various important built-in features (security, data-dependent routing, encryption, and so on) that come with the Tuxedo system and how these features can be used to make your application more secure, effective, and responsive to address your business needs. These features are configurable, and there is no need to do any custom development, hence they are very cost-effective and easy to use. We will also discuss responsibilities of Tuxedo administrator for administering the Tuxedo queue.Read The important features of Tuxedo in full
When embarking on an SOA journey, developers often come across the daunting realities of multiple programming languages, technologies, data format representation, implementation framework options, and such others, when they build services, use services, and develop solutions that aggregate services. The focus should be on programming the business and service design, not on the technology of the underlying implementation.
In this article by Matjaz B. Juric, author of the book WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7, we will take a look at IBM's SOA programming model.Read The IBM SOA Programming Model in full
The Grails Object Relational Mapping (GORM) is a core component of the Grails web application framework and uses DSL- style techniques to apply persistence to regular Groovy classes.
In this article by Fergal Dearle, author of the book Groovy for Domain-Specific Languages, we will take a look at the Grails Object Relational Mapping (GORM). We will also see how a GORM model is built.Read The Grails Object Relational Mapping (GORM) in full
The conductor of the orchestra is of course the GNS3 GUI, who wields its Dynagen-like baton — the GNS3 management console, to control the three main sections in the orchestra: Dynamips , qemuwrapper , and vboxwrapper. Let "RedNectar" Chris Welsh, the author of GNS3 Network Simulation Guide, take you through a complex suite with a variety of objects: Cisco routers, generic switches, Qemu devices, and VirtualBox devices.Read The GNS3 orchestra in full
In this article by Bill Bejeck, the author of Getting started with Google Guava, discusses Guava that will give Java developers a boost in their productivity and the introduction of the functional programming idioms provided by Guava.
In this article, we are going to cover the following things:
- The EventBus and AsyncEventBus classes
- Subscribing to events and registering with EventBus to be notified of events
- Publishing events with EventBus
- Writing event handlers and choosing between coarse-grained or fine-grained event handlers depending on our needs
- Using a dependency injection framework in conjunction with EventBus
The primary focus of The Elements of the Spring Web Flow Configuration File is to give you an in-depth look into the Spring Web Flow configuration file and its elements. In this article by Sven Lüppken, we will see which elements and their attributes are allowed in the Spring Web Flow configuration file. This article makes it easier to understand how the XML Schema definition file works, in case you have to take a look at the file of Spring Web Flow while you're configuring your flow.Read The Elements of the Spring Web Flow Configuration File in full
Donations play a crucial role in supporting Free and Open Source Software projects. At times readers will write in to share their positive experience with a utility or program or a distribution that I have written about. Now don't confuse them with your average technical-bent-of-mind Linux user. These are accountants, home-office businessman, and even carpenters and plumbers, who've saved a lot of money thanks to open source software. And they have one question in mind -- how do I help the person behind the program?
This month, Packt columnist and open source enthusiast Mayank Sharma explores the economics behind open source projects, what they do with their donations and how crucial they can be to their future.Read The Economics of Open Source Donations in full
Gentoo is a source-based Linux distribution that helps users put together a streamlined custom system. But Linux users spoiled by the see-before-you-try Live CDs would often shy from Gentoo. Then along came Kororaa. Kororaa is a pre-configured binary Live CD for Gentoo Linux that also features an installer. Kororaa's package selection not only makes it an all-round Linux desktop, but has also ruffled feathers of Linux kernel developers.
Kororaa's developer Chris Smart probably had the best tutors introduce him to Linux, including Andrew Tridgell, the author of Samba file server. In this discussion, Chris talks about why he developed Kororaa, why people interested in learning Linux should use Gentoo, and his new project to help users make the move to Free and Open Source software.
Read more about this in Packt Columnist Mayank Sharma's interview with Chris Smart.Read The easy to install Gentoo with bling-bling. No, the other one! in full
Microsoft Data Protection Manager (DPM) 2010 is a backup and recovery solution which provides continuous data protection for Windows application and file servers to seamlessly integrated disk, tape, and cloud.
In this article by Steve Buchanan, author of Microsoft Data Protection Manager 2010, we will take a look at the existing as well as new features of DPM.Read The DPM Feature Set in full
In this article by Karen M. Tracey, author of the book Django 1.1 Testing and Debugging, we will see that the Django Debug Toolbar is a very useful general purpose debugging tool for Django applications. It lets you see the SQL queries that were needed to produce a page. We will also see, it goes far beyond that, providing easy access to much more information about the SQL queries and other aspects of request processing.Read The Django Debug Toolbar in full
In the world of DB2 replication, we have two main options—SQL replication and Q replication, both of which involve replicating between source and target tables. The choice of replication solution depends on a number of factors, of which the fundamental ones are:
- Type of source
- Type of target
- Operating system support
In this article by Pav Kumar-Chatterjee, author of IBM InfoSphere Replication Server and Data Event Publisher, we look at the different types of replication available, namely the base replication methods of unidirectional, bidirectional, and peer-to-peer.Read The Different Types of Q Replication in full