This two-part article series by Veda Williams, deals with Plone 3 Theming. In the first part we covered graphic design tools, browser toolbars and extensions, and CSS validators.
In this part of the article we will cover text editors.Read Skinner's Toolkit for Plone 3 Theming (Part 2) in full
This article created by Emilio Aristides de Fez Laso author of Instant Autolt Scripting discusses about how Skype can be automated to aid in communications.
Skype sends messages to a selected user. Consider two similar SendChat functions as an example. Echo123 is Skype's default sound test user. Change it to another user name you want from user properties (space not allowed).Read Skype automation in full
Handling, processing, and representing data in the 2.0 era of web applications has become so crucial that designers and programmers are working towards new ways of improving the user interface experience. Slider is one such killer concept, using which the user can represent and handle data easily. In this two-part article series we will explore different types of Sliders and code usage and options with a hands-on example with vertical and horizontal slider.
In this article by Sridhar Rao, we shall be covering the following topics:
- First steps with the script.aculo.us slider
- Types of the slider
- Code usage for the slider
A slider, according to the dictionary, stands for the one that slides. Yes, a slider in the web application context stands for holding and sliding values from a fixed given range, or even from an array of values. The slider is really useful and worthy in places where the user needs to slide through a lot of values and also the application needs to respond to those values and changes. In the first part we were introduced to types of Sliders and code usage for the slider. This is the second part of a two part article on the concept of sliders using script.aculo.us.
In this article by Sridhar Rao, we shall cover:
- Code usage for the slider and options
- Tips and tricks with the slider
- Hands-on example with vertical and horizontal slider
In a dimensional model, you have a fact table and multiple dimension tables related to the fact table. Slowly Changing Dimension (SCD) is the technique to maintain the history of data in dimension tables.
The basic SCD has three types, called Type 1, 2, and 3. SCD Type 6 combines the three basic techniques. After introducing these three basic types, this article by Djoni Darmawikarta, shows by example what SCD Type 6 is and how it works.Read Slowly Changing Dimension (SCD) Type 6 in full
This article by Mauricio Salatino and Esteban Aliverti, authors of jBPM5 Developer Guide, covers some of the common uses of business rules and business processes together. In order to understand how these two worlds are merged inside the Drools & jBPM5 platform, we need to appreciate how a rule engine works. This article covers:
Good old integration patterns between processes and rules
A quick introduction to the Drools Rule Engine
How to leverage the power of the rule engine in our business processes
Common usage patterns
Read Smart Processes Using Rules in full
This article by João Sávio Ceregatti Longo and Felipe Fedel Pinto, authors of the book Instant Apache Wicket 6, aims to introduce the reader to the world of Apache Wicket 6. This beginner-level guide takes the reader through the basic workflow of Apache Wicket in a practical and friendly style.Read So, what is Apache Wicket? in full
In this article written by Mauro Rocco, authors of Instant Django 1.5 Application Development Starter , you will find out what Django actually is, what you can do with it, and why it's so great.Read So, what is Django? in full
This article by Fabio Biondi , author of Instant EaselJS Starter helps you to learn what EaselJS actually is, what you can do with it, and why it's so great. It will also help you on how to create your first HTML5 canvas application "Hello World".Read So, what is EaselJS? in full
- Component model
- Plugin free charting
- CSS theming
Google Drive is a place where you can safely store your files online and access them from anywhere. When you use Google Drive, your files are stored remotely on the Web instead of your computer's hard drive. This is the main idea behind "cloud computing".
Once your files are online and "in the cloud", you can access and edit them from wherever you are using any standard web browser. You can even use your smartphone or tablet computer to access your files on the go. You can also share your files with people that you choose, making it easier than ever to collaborate with others and get stuff done.
Google Drive also includes an optional free sync program that runs on your computer and keeps files synchronized between a folder on your hard drive and Google Drive on the Web. That way, whenever you create or make changes to a file, either on the Web or on your hard drive, it will automatically be kept in sync between your computer and the cloud.
In this article by Mike Procopio, author of Instant Google Drive Starter, you will learn the basics of Google Drive and how to use Google Drive on your phone or tablet computer.Read So, what is Google Drive? in full
In this article by Andrey Kovalenko, the author of the book, Instant KineticJS Starter, we will learn about the basics of KineticJS.
This article by Karthik Ranganath, the author of Instant Metasploit Starter, outlines the need for a framework such as Metasploit in a penetration tester's arsenal. But before we dive into the framework, let's understand how the framework has evolved. The following are some basic concepts that will be frequently used in this article:
- Vulnerability: In simple terms, vulnerability is a loophole in the system. It acts as a channel for an attacker to penetrate the system, which in other words is called exploitation.
- Exploit: I would recursively define this term as any working piece of code that is used to exploit a vulnerable system.
- Payload: An attacker exploits a system with a purpose. So, after a successful exploit whatever he/she intends to do with the system stands for payload. In other words,the payload is any working piece of code bundled with an exploit to aid the attacker in the post-exploitation phase.
I have defined these terms right at the beginning because these terms will be used very often throughout this article.Read So, what is Metasploit? in full
Welcome to the world of virtualization. In this article, by Vicente Rodriguez Eguibar, the author of Instant Hyper-V Server Virtualization Starter, we will explain in simple terms what virtualization is, where it comes from, and why this technology is amazing. So let's start.Read So, what is Microsoft © Hyper-V server 2008 R2? in full
This article by Amol Nayak the author of Instant MongoDB, describes the need of MongoDB and its advantages over relational databases. MongoDB is a Documented Oriented Database. By the end of this article, you will be aware of the features of MongoDB.Read So, what is MongoDB? in full