OpenStreetMap is a diverse project with hundreds of thousands of people contributing data and making use of it in different ways. As a result, many of the resources that mappers have created and use are scattered around the Internet, but the project data and much of the documentation is hosted at openstreetmap.org, on servers operated by the OpenStreetMap Foundation.
In this article by Jonathan Bennett, author of the book OpenStreetMap, we'll look at some of the following tools you can use to check OpenStreetMap data in a particular area, and what problems they can and can't tell you about:
- The data inspection tools on openstreetmap.org
- The NoName map
- ITOWorld OSM Mapper
- Geofabrik's OSM Inspector
Some of these tools identify specific problems, while others allow you to see when changes to the data were made and by whom. In either case, all these tools can do is offer guidance, not black-and-white answers, and you always need to use judgment when checking data.Read Checking OpenStreetMap Data for Problems in full
In this article by Arie Geller and Matthew Lyon, authors of the book Oracle Application Express 3.2 – The Essentials and More, we will see how to save the checked checkboxes into a database table.Read Checkbox Persistence in Tabular Forms (Reports) in full
DWR (Direct Web Remoting), is an Open Source Java framework, licensed under commercial-friendly Apache Software License v2 for building AJAX applications. DWR's main idea is to hide AJAX implementation details such as XMLHttpRequest from developers. Developers can concentrate on developing the application and business objects and leave AJAX details behind the scenes where they belong.
In this article by Sami Salkosuo, we discuss a Chatroom application which demonstrates the use of DWR. The Chatroom sample application is a very typical multi-user chatroom. The functionalities of this sample include a list of online users, automatic refresh of chat text, and the ability to send messages to the chat room.Read Chatroom Application using DWR Java Framework in full
This is the second part of the two-part tutorial by Jonathan Williamson. In this tutorial, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. To read the first part, click: Character Head Modeling in Blender: Part 1Read Character Head Modeling in Blender: Part 2 in full
In this two-part tutorial by Jonathan Williamson, we are going to look at how to model a character head in Blender. Along with basic modeling tools we will also focus heavily on good topology and how to create a clean mesh that will deform well during animation. This tutorial will take you through the whole process from setting up a background image as a reference, to laying out the topology, to tweaking the final model proportions and mesh structure.Read Character Head Modeling in Blender: Part 1 in full
In this article by Sten Vesterli, author of Oracle ADF Enterprise Application Development – Made Simple, Second Edition, explains how to use the powerful skin editor available in JDeveloper 11g Release 2 and later versions to create Cascading Style Sheets to create a new skin, which corresponds to your enterprise visual identity, for your application.Read Changing the Appearance in full
Change is a constant companion in our daily routine. Most of what we do is changing (transforming) one work product into another or revising or updating it. We might be transforming requirements into design, design into a prototype, client brief into a story board, idea into a concept document, creating versions of a banner ad, or updating a project plan to reflect progress; the list goes on. In this introductory article by Gurudutt Talgery we will see how we can bring a change management discipline to our work products or personal – not just software – projects with two simple tools on Linux: Subversion and a GUI front-end called eSvn.Read Change Control for Personal Projects - Subversion Style in full
This article by Michael Havey explains to SOA veterans how to make good use of Complex Event Processing (CEP): a technology that is perhaps unfamiliar and obscure. CEP is a large topic, but we will focus on four specific subjects:
- The nature of CEP, explained in terms of its relationship with SOA.
- Where CEP fits in the SOA stack.
- The contrasting coding styles of CEP and SOA.
- CEP-aware SOA processes.
In this article by Ajit Kumar, author of Sencha Touch Cookbook (2nd edition), we will go through all the form fields and understand how to make use of them and learn about their specific behaviors. Also, we will see how to create a form using one or more form fields, and handle form validation and submission.
In this article, we will cover the following topics:
- Getting your form ready with form panels
- Working with search
- Applying custom validation in the e-mail field
- Working with dates using the date picker
- Making a field hidden
- Working with the select field
- Changing a value using slider
- Spinning the number wheel using spinner
- Toggling between your two choices
- Checkbox and checkbox groups
- Text and text area
- Grouping fields with fieldset
- Validating your form
In the previous part of the article, we saw how to Create Categories and Add products to our store. In this part by William Rice, we will learn how to create Attributes and Attribute Sets in Magento.Read Categories and Attributes in Magento: Part 2 in full
In this article by William Rice, we will learn about Categories, Products, and Attributes in Magento.
The combination of products, presentation, and service makes our store unique. In this part, we will see how to add products to our store. Before adding products, we need to make some decisions about how we will organize our site. A few minutes of planning now can save us hours of work later.Read Categories and Attributes in Magento: Part 1 in full
As we know, DBIx::Class can provide a powerful interface to your data. Sometimes, however, DBIx::Class is not the right tool for the job. Situations often arise in which your application won't be able to access database tables directly and instead you'll need to access data through predefined stored procedures. In this case, DBIx::Class would be useless as you aren't able to read and modify objects with the usual SELECT, INSERT, UPDATE, and DELETE command set—everything must be done by calling a procedure and reading back the result. In other cases, your data won't be in a database at all. You might instead choose to store and retrieve information from files in a directory.
In this article, author Jonathan Rockway covers three common cases—mixing a procedural interface with a relational DBIx::Class interface, writing a database interface without DBIx:: Class, and building a custom Model that doesn't use a database at all.Read Catalyst Web Framework: Building Your Own Model in full
In this article by Ian Grieve, the author of the book Microsoft Dynamics GP 2013 Financial Management looks at the methods for inquiring and reporting on budgets in Dynamics GP, including the use of Management Reporter 2012.Read Cash Flow Management in full
This article by Simon Russell and Michael Szabo the authors of Cinema 4D R14 Cookbook gives a brief description about the camera in Cinema 4D which ultimately controls how people will see and interpret the final image, target cameras, calibration of cameras, and so on. By the end of this article, you will be aware of the camera in Cinema 4D.
In this article, we will cover the following topics:
- Keyframing cameras
- Moving a camera along a path
- Locking cameras down with the Protection tag
- Using target cameras
- Adjusting focal lengths
- Matching your camera to footage
- The Physical tab
- Creating a handheld-style camera
- Setting up stereoscopic cameras
- Camera calibration
- Using the Motion Camera tag
- Simulating a chase scene
- Getting to grips with the Camera Morph tag
- Complex camera moving with the Multi Morph tag
Once your extensions are working, we can begin exploring call routing also called as call control. When someone calls from the outside world, what do you want to do with the call? How do you want your calls to get to an extension? Unless you want your calls to go directly to an extension, you will need to configure one or more of the following features which we'll be covering in this article by Matthew M. Landis and Robert Lloyd, authors of The 3CX IP PBX Tutorial:
- Ring groups (also called Hunt groups in other PBX systems)
- Digital Receptionists or Auto-attendants
- Call by name (also called Dial by Name in some PBX systems)
- Call queues
In this article by Kae Verens, we will discuss the following topics:
- Displaying a calendar for a week
- Creating and saving an event in that calendar
- Moving, editing, and deleting events
- Creating recurring events
- Editing and removing recurring events
We will use the jquery-week-calendar plugin to create and edit normal and recurring events.Read Calendars in jQuery 1.3 with PHP using jQuery Week Calendar Plugin: Part 1 in full
We can use events to represent due dates and exams for a school and reorganize them dynamically using collections. But a school's use of events will likely span athletics, music performances, conferences, and much more.
In this article by Erik Rose, we embark on a deeper study of Plone events and see how to:
- Harness the best-of-breed Plone4Artists Calendar product to improve the display of event listings
- Gather events from across a site into a central calendar, culling out class-specific due dates and assignments
- Let visitors browse a single hierarchy of events arranged by subject while still allowing edit permissions to be delegated along organization boundaries
- Represent recurring events
This article explains how to set up authentication on a CakePHP application. This is accomplished through the use of tools that are built into the framework core, which allow us to quickly set up secure areas without losing flexibility to build more complex solutions.
In this article by Mariano Iglesias, author of CakePHP 1.3 Application Development Cookbook, we will cover the following topics:
- Setting up a basic authentication system
- Using and configuring the Auth component
- Allowing logins with e-mail or username
- Saving the user details after login
- Getting the current user's information
- Using prefixes for role-based access control
- Setting up Access Control Layer based authentication