Enterprise Articles

Excel 2010 Financials: Using Graphs for Analysis

by Andre Odnoha | June 2011 | Cookbooks Enterprise Articles Microsoft

Using graphs for financial and statistical analysis allows you to analyze and present data in a meaningful and functional way utilizing graphs that even Excel didn't know it could do. In this article by Andre Odnoha, author of Excel 2010 Financials Cookbook, you will learn to not only add reusable methods to automate graph production, but also how to create graphs and graphing sets that are not native to Excel.

In this article, you will learn the following recipes:

  • Charting financial frequency trending with a histogram
  • Creating a stem and leaf plot
  • Creating a Box and Whisker Plot
  • Using a graph overlay for profit and expenses
  • Graphing the principal of a loan automatically
Read Excel 2010 Financials: Using Graphs for Analysis in full

Excel 2010 Financials: Adding Animations to Excel Graphs

by Andre Odnoha | June 2011 | Cookbooks Enterprise Articles Microsoft

Graphs are an important and essential method of demonstrating information visually for analysis and ease of understanding. Graphs in Excel, however, are static visual representations. You can filter the data or adjust the dataset to change the information that is displayed; however, the graph itself is still a static image. Adding animation visualization to a graph will add an element of professionalism to a presentation.

In this recipe by Andre Odnoha, author of Excel 2010 Financials Cookbook, you will learn how to add animation to Excel graphs.

Read Excel 2010 Financials: Adding Animations to Excel Graphs in full

Flash Development for Android: Audio Input via Microphone

by Joseph Labrecque | June 2011 | Cookbooks Enterprise Articles

This article discusses how to capture audio from integrated device hardware through Flash based capture methods.

This article by Joseph Labrecque, author of Flash Development for Android Cookbook, will cover the following recipes:

  • Detecting microphone support
  • Using the device microphone to monitor audio sample data
  • Recording microphone audio sample data
Read Flash Development for Android: Audio Input via Microphone in full

Managing Citrix Policies

by Guillermo Musumeci | June 2011 | Enterprise Articles

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure applications quickly to thousands of users.

In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will cover:

  • Understanding Citrix policies
  • Using the Group Policy Management Console, Citrix Delivery Services
  • Console, and Local Group Policy Editor to manage Citrix Policies
  • How to create, manage, and apply Citrix policies
  • Troubleshooting Citrix policies
Read Managing Citrix Policies in full

EJB 3.1: Controlling Security Programmatically Using JAAS

by Richard M. Reese | June 2011 | Cookbooks Enterprise Articles Java

This article by Richard Reese, author of EJB 3.1 Cookbook, covers programmatic EJB security based upon the Java Authentication and Authorization Service (JAAS) API. It should be used when declarative annotation is not adequate to affect the level of security desired. This can occur when access is time-based. For example, a user may only be allowed to access certain services during normal business hours such as when the stock market is open.

Read EJB 3.1: Controlling Security Programmatically Using JAAS in full

Designing a XenApp 6 Farm

by Guillermo Musumeci | June 2011 | Enterprise Articles

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure applications quickly to thousands of users.

The most important step before any Citrix deployment is to understand the features of the product and design the architecture before the servers are set up.

In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will cover the following topics:

  • Learning Citrix farm terminology and concepts
  • Designing a basic XenApp architecture
  • Designing a basic pilot plan
  • Creating a list of applications to publish in our Citrix farm
  • Reviewing a list of applications and deciding the best method to deliver them
Read Designing a XenApp 6 Farm in full

Hands-on Tutorial on EJB 3.1 Security

by Richard M. Reese | June 2011 | Cookbooks Enterprise Articles Java

This article by Richard Reese, author of EJB 3.1 Cookbook, covers the process of handling security using annotations. The relationship between the support provided by the server and the roles used by an application is also examined. By the end of this article we will be:

  • Creating the SecurityApplication
  • Configuring the server to handle security
  • Understanding and declaring roles
  • Controlling security using declarations
  • Propagating identity
Read Hands-on Tutorial on EJB 3.1 Security in full

Customization using ADF Meta Data Services

by | June 2011 | Enterprise Articles Oracle

You know that you can change the way your application looks—and that you can deploy the same application to different users with different visual appearance. But your boss at DMC Solutions would like to be able to sell the XDM application to different customers, offering each of them a slightly different functionality.

Fortunately, ADF makes that easy through a feature known as customization.

This article by Sten E. Vesterli, author of Oracle ADF Enterprise Application Development—Made Simple, explains how to set up an application for customization using ADF Meta Data Services and how to use the special JDeveloper "customization" role to perform the actual customization.

Read Customization using ADF Meta Data Services in full

Securing your JIRA 4

by Patrick Li | June 2011 | Enterprise Articles Java

As an information system, JIRA is all about data. It should come as no surprise to you that security plays a big role in JIRA not only to ensure that only the right people get access to the data, but also to maintain data integrity by preventing accidental changes.

By the end of the article by Patrick Li, author of JIRA 4 Essentials, you will have learned:

  • How to utilize user management features in JIRA
  • About JIRA's permission hierarchy
  • About general access control in JIRA
  • How to manage fine-grained permission settings
Read Securing your JIRA 4 in full

The ADF Proof of Concept

by Sten E. Vesterli | June 2011 | Enterprise Articles Oracle

Your organization has decided that ADF might be the right tool to build your next enterprise application—now you need to set up an experiment to prove that your assumption is correct.

In this article by Sten E. Vesterli, author of Oracle ADF Enterprise Application Development—Made Simple, we will see what a Proof of Concept is, and why we need it. We will also take a look at the ADF architecture.

Read The ADF Proof of Concept in full
Syndicate content
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software