The grid is, without doubt, one of the most widely-used components of Ext JS. We all have data, and this needs to be presented to the end user in an easy-to-understand manner. The spreadsheet (a.k.a. grid) is the perfect way to do this—the concept has been around for quite a while because it works. Ext JS takes that concept and makes it flexible and downright amazing!
In this article by Shea Frederick, Colin Ramsay, Steve 'Cutter' Blades, and Nigel White, authors of the book Learning Ext JS 3.2, we will be:
- Using a GridPanel to display structured data in a user-friendly manner
- Reading data from the server (which provides the data from a database) to display in the grid
Akka is a toolkit and runtime for building highly concurrent, distributed, and fault-tolerant event-driven applications on the JVM. Dispatchers are the heart of the Akka application. It is the engine that powers the Akka application. It is very important to understand the switches and knobs that need to be tuned to extract the maximum concurrency and scalability out of the application. Routers on the other hand, route incoming messages to outbound actors.
In this article by Munish K. Gupta, author of Akka Essentials, we will cover:
- What a dispatcher is and how it works, various types of dispatchers and theirusage and configuration settings
- Different types of mailboxes, and their usage and configuration
- What a router is, and different types of routers and their usage
- How to write a custom router
The primary focus of this article is to explain how to add comments and how to moderate these comments. In this article by Hasin Hayder and April Hodge Silver, we'll see how we can alter the comment and avtar settings and how we can avoid spam comments using Akismet plugin.Read Discussion on Your WordPress Blog Using Comments in full
In this article by Jan Palach, author of Parallel Programming with Python, we will expose some Python libraries to implement parallel solutions.
The Python language, created by Guido Van Rossum, is a multi-paradigm, multi-purpose language. It has been widely accepted worldwide due to its powerful simplicity and easy maintenance. It is also known as the language that has batteries included. There is a wide range of modules to make its use smoother. Within parallel programming, Python has built-in and external modules that simplify implementation. This work is based on Python 3.x.Read Discovering Python's parallel programming tools in full
In this article by Peter Ward, Peter Abreu, Pavlo Andrushkiw, Pat Esposito, Jeff Gellman, and Joel Plaut, the authors of Microssoft SharePoint 2013 Diaster Recovery Guide, explains data prevention and recovery procedures that should be applied by users with their SharePoint collaboration activities to prevent data loss.
The reader of this article is probably technical, and therefore perhaps a little surprised by the title and the topic of this article. You probably assume that DR is an IT department activity, so why should the end user even think about it?Read Disaster Recovery Techniques for End Users in full
One thing that is certain in computing is that hardware will fail even if the software is written soundly. For this reason, a disaster recovery plan should be implemented for every database server. Even if you are not the administrator of the server, this article will show you how to back up the data you use.
In this article, Albert Lukaszewski, PhD, author of MySQL for Python, we will have covered:
- When to implement one of several kinds of database backup plans
- What methods of backup and disaster recovery MySQL supports
- How to use Python to back up databases
The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability and elasticity, bringing everything you need to create, manage and build the core components of a Microsoft Private Cloud for virtualized workloads.
In this article by Leandro Cavalho, the author of Windows Server 2012 Hyper-V Cookbook, we will cover the following topics:
Backing up Hyper-V and virtual machines using Windows Server Backup
Restoring Hyper-V and virtual machines using Windows Server Backup
Confguring Hyper-V Replica between two Hyper-V hosts using HTTP authentication
Confguring Hyper-V Replica broker for a Failover Cluster
Confguring Hyper-V Replica to use certificate-based authentication using an Enterprise CA
Using snapshots in virtual machines
This is the second part of the 2 series article by Sitaraman Lakshminarayanan on Digitally Signing and Verifying Messages in Web Services using Oracle.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part explained concepts like digital signatures,their importance,their functional use with respect to web services, but mainly focussed on how Oracle Web Services Manager can help generate and verify signatures in web services.In the this part,he explain signature generation and signature verification along with an example. For all those who missed out the initial action just click onto : http://www.packtpub.com/article/digitally-signing-and-verifying-messages-web-services-part1Read Digitally Signing and Verifying Messages in Web Services ( part 2 ) in full
This is a two article series by Sitaraman Lakshminarayanan.The article revolves around how to digitally sign and verify messages in web services using Oracle Web Services Manager.The first part will explain concepts like digital signatures,their importance,their functional use with respect to web services, but will mainly focus on how Oracle Web Services Manager can help generate and verify signatures in web services.In the next part,he will explain signature generation and signature verification along with an example.Read Digitally Signing and Verifying Messages in Web Services ( part 1 ) in full
A Windows Azure hosted service may comprise multiple instances of multiple roles. These instances all run in a remote Windows Azure data center—typically 24*7. The ability to monitor these instances non-intrusively is essential both in detecting failure and in capacity planning. This article by Neil Mackenzie, author of Microsoft Windows Azure Development Cookbook, shows how Windows Azure Diagnostics provides for the non-intrusive capture of diagnostic data and its subsequent persistence to the Windows Azure Storage Service. Windows Azure Diagnostics supports various standard sources, allowing for their extensibility where appropriate. The topics covered in this article include:
- Using the Windows Azure Diagnostics trace listener
- Performing an on-demand transfer
- Implementing custom logging
- Accessing data persisted to Windows Azure Storage
- Using the Windows Azure Platform
- PowerShell cmdlets to configure Windows Azure Diagnostics
In this article by Edward Callahan, author of Easy Web Development with WaveMaker, we will examine the WaveMaker application architecture. We will learn about the client, the server, how they are constructed, and some of the core features available to us in each. We'll examine the HTTP requests made to the server and examine the JSON request of a database read call. We'll also learn about typing in WaveMaker. We'll finish this article with a tour of the Studio WaveMaker application. By the end of this article, you will have learned about:
- The client framework
- The server architecture
- Communications between client and server
- Application file structure
This article will help us learn about the different ways of running Squid and the available options that can be passed to Squid from the command line. We will also learn about debugging the Squid configuration file.
In this article by Kulbir Saini, author of Squid Proxy Server 3 Beginners Guide, we will learn the following:
- Various command line options for running Squid
- Parsing the squid configuration file for syntax errors
- Using an alternate squid configuration file for testing purposes
- Different ways of starting Squid
- Rotating log files generated by Squid
NHibernate is an open source object-relational mapper, or simply put, a way to rapidly retrieve data from your database into standard .NET objects.
In this article by Aaron B. Cure, Author of NHibernate 2 Beginner's Guide, we will learn how to glue tables and classes that hold our data in the applicationRead Different types of Mapping in Nhibernate 2 in full
In this article written by Cory Simmons, the author of the book Instant Responsive Web Design provides you with all the information you need to start building responsive, mobile-friendly websites today.
Since Ethan Marcotte coined the term "responsive web design", people have been looking for the best way to do it, which has cumulated into the Goldilocks approach versus the Fluid approach, and Desktop-first versus Mobile-first. The only right answer is to do what you're most comfortable with and, as always, avoid dogma. In this section we'll go over the differences between each approach and even sample them so your RWD tool belt is well equipped.Read Different strategies to make responsive websites in full
In this article by Thomas Alexandre, the author of Scala for Java Developers, we discuss that if you are going to refactor or rewrite Java code into Scala code, there are a number of style differences that are useful to be aware of. Obviously, programming style is largely a matter of taste; however, a few guidelines generally acknowledged by the Scala community can help someone new to Scala to write easier-to-read and more maintainable code. This article is dedicated to showing some of the most common differences.Read Differences in style between Java and Scala code in full
This article written by Chandru Shankar, Vincent Bellefroid, and Nilesh Thakkar, the authors of the book Customer Success with Microsoft Dynamics Sure Step discusses the activities and covers in detail the Decision Accelerator Offerings that help to accelerate the sales cycles and bring them to a close while also helping the customer with their due diligence process.Read Diagnostic leveraging of the Accelerated POC with the CRM Online service in full
In this article by Michael Badger, we will go through the process of discovering and modeling devices to build an inventory of the network.
We'll start this article by fine tuning our device inventory through manually adding devices to our inventory. Then we'll take a look at the main device status view and perform some routine device administration tasks. The second half of the article demonstrates the available monitoring protocols that Zenoss uses to model the devices.
We'll continue to demonstrate features using the Mill Race network, but feel free to substitute your own devices in the examples given in this article. By the time we finish this article, we'll have a detailed model of our networks.Read Device Management in Zenoss Core Network and System Monitoring: Part 1 in full