This article by Gustavo De La Vega Alvarez, the author of Instant PhoneGap, has discussed how to implement geolocation in our app, we will use the API that PhoneGap provides us as part of a bunch of methods to use through our app. To build this, we need to create a JS file called myplaces.js. Create the file once using a text editor program such as Sublime Text or Notepad. Then we will perform the following steps:Read Geolocation – using PhoneGap features to improve an app's functionality, write once use everywhere in full
In this article by Matt Palmer, author of Instant Redis Persistence, we'll step through a number of different scenarios, and how you can go about protecting against each one.
While securing your data isn't strictly a persistence topic, it is an important one to consider when planning your data storage strategy. If your stored data can be accessed improperly, you're in a whole world of pain.
A common complaint about Redis is that it has no means of controlling who has access to the Redis server—if you can connect to the Redis server, you've got the ability to fully access and manipulate the data stored in that server.Read Using Redis in a hostile environment (Advanced) in full
In this article written by Piero Giacomelli, the author of the book Apache Mahout Cookbook, we will implement the Naïve Bayes classifier for creating clusters and aggregating unstructured information in a manageable way.
We will cover the following recipes in this article:
- Using the Mahout text classifier to demonstrate the basic use case
- Using the Naïve Bayes classifier from code
- Using Complementary Naïve Bayes from the command line
- Coding the Complementary Naïve Bayes classifier
This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.
Read Acting as a proxy (HttpProxyModule) in full
This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.
The list of topics that will be covered in the article is as follows:
- Understanding identity and resource pools
- Learning to create a UUID pool
- Learning to create a MAC pool
- Learning to create a WWNN pool
- Learning to create a WWPN pool
- Understanding the server pool
- Learning to create server pool membership and qualification policies
In this article by Jochen Nickel, author of Learning Microsoft Windows Server 2012 Dynamic Access Control, we will have a look at the Microsoft DAC 2012, which is an end-to-end file server solution. We will have a look at the main components of Dynamic Access Control (DAC) for better granular overview.Read Microsoft DAC 2012 in full
In this article, Alfredo Serafini, the author of Apache Solr Beginner's Guide, covers how to perform a faceted search.Read Using Faceted Search, from Searching to Finding in full
In this article by Bernardo Iraci, author of the book Blender Cycles: Lighting and Rendering Cookbook, we are going to create all the material for an iceberg. Our target is to have snow on the flat surfaces and ice on the slopes, where it is too steep for the snow to stay. Let's get started!Read Creating the ice and snow materials in full
This article written by Michael Fontanini, the author of the book Game Development with SlimDX, focuses on drawing 2D graphics using Direct2D.Read Creating a Direct2D game window class in full
This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).
Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.Read Social Engineering Attacks in full
This article by Faisal Ghadially and Kalpit Parikh, the authors of Oracle Fusion Applications Administration Essentials, provides an architectural overview and an introduction to the technical components of Oracle Fusion Applications.Read Getting Started with Fusion Applications in full
In this article by Igor Uduslivii author of iPhone Game Blueprints we will design how a game character will appear. Game worlds have become larger and give players plenty more adventure experiences. The heightened pictorial look of the characters increases players' empathy toward their avatars, generating greater feelings of exciting.Read Planning a character's look in full
In this article written by Jacobo Rodríguez, the author of the book GLSL Essentials, we will learn how to set up the shaders from the host application side.
OpenGL 4.3 is a C language API that bases its design in encapsulating objects in opaque handles that represents abstract concepts (from the user's point of view) such as textures, shaders, vertex buffers, and so on. In order to render something using OpenGL, we have to create those objects, associate our data to them, and issue the required OpenGL commands to set them as active, and in the last term, launch the draw call.
Let's define an important computer graphics concept: a rendering batch. A rendering batch is the geometry set that will be rendered along with the textures, OpenGL's states and shaders. Once we have all that data ready, we can issue the drawing command to the GPU, and hopefully (if we did everything correctly) watch the rendering in our screen.
The order of the creation of the different OpenGL objects is not relevant. You can first create the vertex buffer or the shaders, or first the textures and then the shaders. I will use the following order just for teaching purposes:
- Vertex array objects
Then, I will put all together and render the batch.Read GLSL – How to Set up the Shaders from the Host Application Side in full
Introduced as a part of the HTML 3 standard, and using the title attribute as its text, tooltips are a common element used to provide context within a page. You could find them in use in a variety of situations, although it is most likely that they will be found when providing assistance in correcting errors as part of the submission of a form (particularly when it concerns payment for products!).Read Working with Tooltips in full
This article created by Andros T. Sturgeon and Shoban Kumar, authors of the book Getting Started with Paint.NET, will provide a quick overview of Paint.NET, some of its functions, and how to install the program using a step-by-step approach. It also goes over the main window and functions of Paint.NET
Paint.NET is a free, reliable program that rivals the most expensive photo editing programs on the market. Now, let us dive into the basic concepts of this software.
In this article will cover a general review of Paint.NET and what you need to do to get it, install it, and prepare it for use.
The topics covered are as follows:
- System requirements
- Downloading and installing Paint.NET
Nothing captures the attention more than an interesting image. If you take an amazing picture with any camera, chances are you will have to process it on some level.
Whether you add a filter, change the color, or add an effect; a small change can turn an average image into a great one. Paint.NET is a Windows-based image editing program that gives you the ability to manipulate images professionally. It rivals similar software that can cost hundreds of dollars. The best part about Paint.NET is that it is a freeware, meaning it's completely free.Read Welcome to Paint.NET in full
In this article by Richard Grimmett, author of the book BeagleBone Robotic Projects, the author has explained how to control the robot.Read Making the Unit Very Mobile - Controlling Legged Movement in full
In this article, by David Wolff, author of OpenGL 4 Shading Language Cookbook Second Edition, we will cover the steps needed to compile, link, and use GLSL shaders within an OpenGL program. It also covers how to send data to shaders using attributes and uniform variables, and the use of the GLM library for mathematics support. Every modern OpenGL program today requires a function loader. We will also cover the use of GLLoadGen, a relatively new and easy-to-use OpenGL loader generator.Read Getting Started with GLSL in full
This article, by Chandrasekhar Mankala and Ganesh Mahadevan V., the authors of the book SAP HANA Cookbook, highlights the SAP HANA architecture and its features.Read SAP HANA Architecture in full
In this article, by Baya Dewald, one of the three authors of the book SQL Server Analysis Services 2012 Cube Development Cookbook we will cover:
- SSAS instance con figuration options
- Creating and dropping databases
- Monitoring SSAS instance using Activity Viewer
- Monitoring SSAS instance using DMVs
- Cancelling a session
- Checking whether cubes are accessible
- Checking SSAS object sizes programmatically
- Backup and restore
- Detaching and attaching databases
This article by Ciro Cardoso, author of Getting Started with Lumion 3D, will give a general overview of Lumion, where you will learn why to use Lumion and what final quality we can get with this application. It will also help you to learn how to use and tweak more than 500 ready-to-use materials that Lumion has.Read What is Lumion? in full
It's time that we learned not only about the ways to prevent the attacks on our Android applications, but also about the attacks themselves. In this article by Keith Makan and Scott Alexander-Bown, the authors of Android Security Cookbook, we will see the casing exploitation techniques that target the Android applications. It shows how to examine them for security risks. This article also talks about the application flaws and fixes. It will walk the readers through the useful techniques that developers can use to protect the applications from such attacks.Read Knowing the SQL-injection attacks and securing our Android applications from them in full
This article by Scott Cranton and Jakub Korab, the authors of Apache Camel Developer's Cookbook, introduces various ways in which Camel allows us to transform or convert between and manipulate common message formats such as Java objects, XML, and JSON. The following ways are discussed in this article:
- Transforming using a Simple Expression
- Transforming inline with XQuery
- Transforming with XSLT
- Transforming from Java to XML with JAXB
- Transforming from Java to JSON
- Transforming from XML to JSON
In this article by Steve Liles, the author of Asynchronous Android, we will take a look at AsyncTask which was introduced in Android at API level 3, Cupcake, with the express purpose of helping developers to avoid blocking the main thread. The Async part of the name of this class comes from the word asynchronous, which literally means not occurring at the same time. AsyncTask is an abstract class, and as such, must be subclassed for use. At the minimum, our subclass must provide an implementation for the abstract doInBackground method, which defines the work that we want to get done off the main thread.
As with any powerful programming abstraction, AsyncTask is not entirely free from issues and compromises.Read Common AsyncTask issues in full
In this article written by Avkash Chauhan, author of Learning Cloudera Impala, we will first learn about various important components of Impala and then discuss the intricate details about Impala inner-workings.Read Key components and inner working of Impala in full
In this article by Adam Culpepper, the author of the book jQuery 2.0 Animation Techniques Beginners Guide, has given a detailed description on how to use the animate() effect to animate the background color and learn how to animate the position of background images inside our elements.Read Background Animation in full
In this article, by Nelson Enriquez and Samundar Singh Rathore, authors of Discovering Business Intelligence Using MicroStrategy 9, we cover the procedures to share reports and the subscription engine.Read Sharing Your BI Reports and Dashboards in full
In this article from JBoss EAP6 High Availability, by Weinan Li, we will learn the basic concepts about high availability and have an overview of the functions that JBoss EAP6 provides to us in this field. And at the end have an overall better understanding JBoss EAP6.Read JBoss EAP6 Overview in full
In this article by Hardik Dangar, author of the book Learning Laravel 4 Application Development, let's start working our way into our first simple CRUD application. We will see how Controllers and routes work and how we can create views. Then we will build our first CRUD application in hours and not in days via some artisan-powered magic. Here are the topics we are going to cover in this article.
- Getting familiar with Laravel 4
- Creating a simple CRUD application with Laravel 4
- Listing the users
- Creating new users
- Editing user information
- Deleting user information
- Adding pagination to our list users
This article by Alberto Paro, author of the book, ElasticSearch Cookbook, covers the basic steps to start using ElasticSearch from the simple install to cloud ones.
In this article, we will cover the following topics:
- Downloading and installing ElasticSearch
- Networking setup
- Setting up a node
- Setting up ElasticSearch for Linux systems (advanced)
- Setting up different node types (advanced)
- Installing a plugin
- Installing a plugin manually
- Removing a plugin
- Changing logging settings (advanced)
In this article by Juha Lumme, the author of BeagleBone Home Automation, we can drive our GPIOs to high or low state, and if we have an LED attached in our circuit, it will either light up or not. We can control the brightness by adjusting the resistance in the circuit, but this is a static way to do it, and once our circuit is complete, we can't change the resistor easily.
So, how can the LEDs on your wrist watch, mobile phone and remote control then fade in and out so perfectly? This is where pulse modulation comes in.Read Pulse width modulator in full
NumPy is the de facto standard for scientific computing in Python. It extends Python with a flexible multidimensional array that allows fast mathematical calculations.
NumPy works as a framework that allows coding complex operations using a concise syntax. The multidimensional array (numpy.ndarray) is internally based on C arrays: in this way the developer can easily interface NumPy with existing C and FORTRAN code. NumPy constitutes a bridge between Python and the legacy code written using those languages.
In this article, by Gabriele Lanaro, author of Python High Performance Programming, we will learn how to create and access NumPy arrays.
In the last few years a number of packages were developed to further increase the speed of NumPy. We will explore one of these packages, numexpr, that optimizes array expressions and takes advantage of multi-core architectures.Read Fast Array Operations with NumPy in full
This article by Juwal Bose, author of the book Starling Game Development Essentials, helps you to understand the isometric projection and details the relationship between the Cartesian and isometric coordinates.
The topics covered in this article are as follows:
- Cartesian to isometric equations
- An isometric view via a matrix transformation
- Implementing the isometric view via isometric art
- Level data structure
- Altering registration points
- Depth sorting
- Understanding isometric movement
- Detecting isometric collision
In this article by Nicolas De loof, author of Cloud Development and Deployment with CloudBees, introduces the concept of Platform as a Service (PaaS) and why this is the best place for a developer to start using Cloud services. We will also introduce CloudBees high-level vision of PaaS.Read Platform as a Service and CloudBees in full
This article written by Paul te Braak, the author of the book Microsoft Tabular Modeling Cookbook, focuses on the complex modeling concepts such as:
- Grouping by binning and sorting with ranks
- Defining many-to-many relationships
- Using the last non-empty function for stock data
In this article by Ravishekhar Banger and Koushik Bhattacharyya, authors of the book OpenCL Programming by Example, we will learn the basic concepts of OpenCL. Parallel Computing has been extensively researched over the past few decades and had been the key research interest at many universities. Parallel Computing uses multiple processors or computers working together on a common algorithm or task. Due to the constraints in the available memory, performance of a single computing unit, and also the need to complete a task quickly, various parallel computing frameworks have been defined. All computers are parallel these days, even your handheld mobiles are multicore platforms and each of these parallel computers uses a parallel computing framework of their choice. Let's define Parallel Computing.Read Hello OpenCL in full
This article by Bhanu Birani, author of Getting Started with Flurry Analytics, covers tracking an application and its specific sections as goals to generate detailed reports using Flurry. As your goals will vary depending on your requirements for the data you want to gather from your application. So Flurry provides you with a way to track all your events using your event ID.Read Settings goals in full
The article by Sigismondo Boschi and Gabriele Santomaggio, the authors of RabbitMQ Cookbook, introduces the basic concepts of AMQP, the Advanced Message Queuing Protocol, on which RabbitMQ is based. It shows how the fire-and-forget messaging model works and how to use it from clients.Read Working with AMQP in full
This article by Richard Carter, the author of Magento Responsive Theme Design, has discussed how to enable a responsive Magento theme for your store. Magento is an open source e-commerce solution. It comes with a variety of tools that are necessary for building a successful online shop.Read Enabling your new theme in Magento in full
In this article by Jason Ventresco, the author of the book VMware Horizon View 5.3 Design Patterns and Best Practices, has explained the storage-related features of View.
View includes two specific features that influence storage design and View infrastructure. One is View Storage Accelerator and the other is tiered storage for View linked clone desktops. This article will go into further detail about each of these features.Read Understanding View storage-related features in full
In this article by Abdulbasit Shaikh and Zakir Laliwala, the authors of Web Crawling and Data Mining with Apache Nutch, we will cover:
- Introduction of Apache Nutch
- Apache Solr Installation
- Apache Hadoop
- Use of Apache Gora
- Integration of Apache Nutch with Apache Accumulo
- Integration of Apache Nutch with MySQL
In this article by Yoram Orzach, the author of Network Analysis Using Wireshark Cookbook, covers the following recipes:
- Configuring TCP and UDP preferences for troubleshooting
- TCP connection problems
- TCP retransmissions – where they come from and why
Unity works using a popular and common approach for game development, which is called the component-based architecture. This approach is widely used in software development to make things more reusable and easier to manage.
Let us talk about the way things are organized in Unity in this article by Sergey Mohov, the author of Practical Game Design with Unity and Playmaker.Read Component-based approach of Unity in full
Welcome to the wonderful world of mobile game development. Whether you are still looking for the right development kit or have already chosen one, this article will be most important. In this article, by Thomas Finnegan, author of the book Unity Android Game Development by Example Beginner's Guide, we explore the various features that come with choosing Unity as your development environment and Android as the target platform. Through comparison with major competitors, it is discovered why Unity and Android stand on the top of the pile. Following that, we examine how Unity and Android work together. Finally, the development environment is set up and we create a simple Hello World application to test that everything is set up correctly. It is assumed you are working in a Windows-based environment.
In this article, we will cover the following topics:
- Major Unity features
- Major Android features
- Unity licensing options
- Installing the JDK
- Installing the Android SDK
- Installing Unity 3D
- Installing Unity Remote
Checking conditions and alarms are the most characteristic functions of any monitoring system, and Zabbix is no exception. What really sets Zabbix apart is that every alarm condition, or triggers—as they are known in this system—can be tied, not only to a single measurement but also to an arbitrary complex calculation, based on all of the data available to the Zabbix server. Furthermore, just as triggers are independent from items, the actions that the server can take based on trigger status are independent from the single trigger, as you will see in the subsequent sections.
In this article written by Andrea Dalle Vacche and Stefano Kewan Lee, authors of the book Mastering Zabbix, you will learn the following things about triggers and actions:
- How to create complex, intelligent triggers
- How to minimize the possibility of false positives
- How to set up Zabbix to take automatic actions based on the trigger status
- How to rely on escalating actions
This article by Peter von Oven, author of VMware Horizon Mirage Essentials, explains all about what Horizon Mirage is and the terminologies used along with the three use case categories: Manage, Migrate, and Protect.Read An Introduction to VMware Horizon Mirage in full
This article by Edwin Schouten, author of IBM® SmartCloud® Essentials, widens our view to the platform as a service solutions on top of IBM® SmartCloud® Enterprise and take a little peek into the foreseeable future.Read Further Developments in full
In this article by Gerald Gierer, the author of the book Enterprise Application Development with Ext JS and Spring, a detailed description about Enterprise Application Development with Ext JS and Spring is given. Enterprise applications require formal processes to be followed, customer or business owner sign-offs, internal testing, User Acceptance Testing (UAT), and many more such hurdles to be overcome before an application is ready for production deployment. This article will explore the following two key areas:
- Using Maven to build and compile Ext JS 4 applications for production use
- GlassFish 4 deployment and configuration concepts
This article by Alexandre Magno, the author of Mobile First bootstrap, has discussed Twitter Bootstrap framework's upcoming version, Mobile First. This milestone is not just technical, it's strategic. It follows the current paradigm of design for the Web. It's a design for the future.Read Bootstrap 3.0 is Mobile First in full
It is time we explain some of the inner workings of Angular. Angular does some neat things for us. It saves us from having to write a bunch of boilerplate code. In this article written by Alex Knol author of the book Dependency Injection with AngularJS, we will see the magic of Angular.
Dependency Injection is baked into AngularJS and heavily used throughout. Another feature is a built-in subset of a jQuery functionality called jQLite. It contains all the necessary functions to make AngularJS run without jQuery and has the exact same interface. If jQuery is available in your application, it will be used instead. Angular also takes the burden of bootstrapping your application, which will be covered later in this article.Read The Magic in full
This article by Gautam Rege, the author of Learning Mongoid, discusses Origin, Memory Maps, Delayed sync, and Journals, Updating Documents and Attributes. Further, it talks about Write Concern, Text index.Read Using Mongoid in full
In this article, by Ryan D. Kelker, author of the book Clojure for Domain-specific Languages, we will go over some basic concepts that apply to software development in any programming language. Each section will explain what the concept is and why the concept should be applied to your projects. As with all sources of information, choose whichever works for you.
This article will cover:
- Pure functions
- General programming concepts
- Clojure writing styles
By the end of this article, you should be able to articulate the concepts of DRY, KISS, YAGNI, and bottom-up development. In addition to this, you should have a better understanding of how to write nicer Clojure as the anti-patterns section displays many examples of both what to do, and what not to do.Read Clojure for Domain-specific Languages - Design Concepts with Clojure in full
In this article by Josephus Callaars, author of Zend Framework 2 Cookbook, we will cover:
- Understanding Authentication methods
- Setting up a simple database Authentication
In this article we will talk about the different methods of authentication and we will show you some examples on how to authenticate and how to create your own authentication method.Read Handling Authentication in full
In this article, by Pawel Frankowski, the author of Joomla! 3 Template Essentials, provides an overview of the concepts that we use in Joomla!. Joomla! is an open source web content management system, and as such, it is free to download, modify, and use.Read Joomla! Template System in full
This article by Kévin Dunglas, the author of the book Persistence in PHP with Doctrine ORM, will leverage some very important parts of Doctrine: Doctrine Query Language(DQL), entity repositories, and the Query Builder.
We will cover the following aspects in this article:
Optimizing the Comment feature
Creating a page to filter the posts with the help of tags
Displaying the number of comments of a post on the home page
In this article by Khalid Mehmood Awan, author of IBM Cognos BI v10.2 Administration Essentials, we will go through all the Cognos components and architecture of IBM Cognos. When it comes to enterprise software, it must involve proper planning, design, and implementation for its success. IBM Cognos is a similar software that has been divided into multiple components, where each component has its dedicated responsibility that makes it easy to handle.Read Managing IBM Cognos BI Server Components in full
This article, by Ben Griffith, the Author of Marketing Automation with Eloqua, walks through setting up a basic digital campaign in Eloqua to send an e-mail. The user interface is introduced, and many of the common tools used in Eloqua are touched upon.Read Creating Your First Campaign in full
Testing automation is a tricky and complex area of computer science, as it requires not only experience in both testing and programming, but also knowing some specifics of using Graphical User Interface (GUI). TestComplete is one of the tools which supports testing of software developed on different platforms and application types (.NET, Win32, Java, Delphi, Web, and so on), at the same time using similar techniques for all of them, thus simplifying process of automation by software testers. In this article by Gennadiy Alpaev, author of TestComplete Cookbook, we will cover several topics related to TestComplete log including working with screenshots.
One of the most important feature in every automation tool is logging capabilities. Well-implemented test logs allow easy discovery, help to fix script problems, and identify reasons for failure. In this article, we will discuss frequently used log features and issues one may face while working with TestComplete.Read Logging Capabilities in full
In this article by Lloyd H. Meinholz, the author of the book "Hudson 3 Essentials" has given a detailed description about Hudson 3 and its properties. Hudson is an open source Java-based web application that executes and monitors jobs. These jobs are typically builds that may produce test results and/or build artifacts. Hudson is maintained as two separate projects: the Hudson core and the Hudson plugins. Hudson core is the web application with several key plugins and is maintained by core Hudson committers. Hudson plugins provide additional functionality to Hudson and are maintained by other Hudson community members.Read Why Hudson? in full
This article by Pradyumna Dash, the author of Getting Started with Oracle VM VirtualBox, has explained the installation of VM virtualbox on Linux. This article provides the information and steps to install and configure VirtualBox on Linux, and also detailed steps to start, update, and remove VirtualBox from the Linux OS.Read Installation of Oracle VM VirtualBox on Linux in full
This article by Alan Wijntje, the author of the book Monitoring with Opsview, gives us information about some of the advanced configurations and other features that Opsview offers us to improve our monitoring setup.Read Using Advanced Host Configurations and Opsview Pro Features in full