You have a few options when it comes to themes. You can activate the default BuddyPress theme, install a different compatible theme, or upgrade your existing theme so that it can be used with BuddyPress. It's easiest to keep things simple, so begin with the default BuddyPress theme. Later on, you can change to a new theme after you've finished installing and configuring everything. In this article by Heather R. Wallace, author of the book WordPress 3 Site Blueprints, we'll discuss the BuddyPress Default Theme.Read Activating the BuddyPress Default Theme and Setting up and Configuring BuddyPress in full
This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.
Read Acting as a proxy (HttpProxyModule) in full
This article by Nuno Mota, the author of the book Microsoft Exchange Server 2013 High Availability, describes site resilience for the Mailbox server by covering the following topics:
- Scenario 1 – active/passive
- Scenario 2 – active/active
- Scenario 3 – third datacenter
- Using Datacenter Activation Coordination (DAC)
- Deciding where to place witness servers
Stanbol describes the annotations on the data it extracts using the Resource Description Format (RDF). RDF is a standard that provides the highly generic and flexible data model, which is the foundation for the Semantic Web.
In this article by Reto Bachmann-Gmür, the author of Instant Apache Stanbol [Instant], will read the data returned by Stanbol as RDF and store and query this data.Read Accessing and using the RDF data in Stanbol in full
In Part 1, we had a look at the Discussion and Considerations of highly flexible role-based access control system (RBAC). In this part of the article by Martin Brampton, we will look at the database implementation. Also we will discuss the code for administering RBAC, and consider in outline how questions about access can be answered.Read Access Control in PHP5 CMS - Part 2 in full
Many websites will want to control who has access to what. Once embarked on this route, it turns out there are many situations where access control is appropriate, and they can easily become very complex. So in this two part article by Martin Brampton, we look at the most highly regarded model–role-based access control (RBAC)–and find ways to implement it. The aim is to achieve a flexible and efficient implementation that can be exploited by increasingly sophisticated software. To show what is going on, the example of a file repository extension is used.Read Access Control in PHP5 CMS - Part 1 in full
In this article, by Rawane Madi, the author of Learning Software Testing with Test Studio, discusses some of the reasons why you would want to achieve software quality. The reasons are to make sure that the system does what it's supposed to do, uncover errors and/or to provide assurance for your software user. This article will explore some general terminologies and processes in software testing and briefly introduce the tool automation features.Read About Test Studio in full
This article by Nishant Neeraj, author of Mastering Apache Cassandra, will describe Cassandra to be distributed, decentralized, fault tolerant, eventually consistent, linearly scalable, and a column-oriented data store. This means Cassandra is made to easily deploy over a cluster of machines located at geographically different places. There is no central master server, so no single point of failure, no bottleneck, data is replicated, and a faulty node can be replaced without any downtime. It's eventually consistent. It is linearly scalable, which means with a greater number of nodes, the requests served per second per node would not go down. Also, the total throughput of the system will increase with each node being added. And finally, it's column oriented, much like a map (or better, a map of sorted maps) or a table with flexible columns where each column is essentially a key-value pair. So, you can add columns as you go, and each row can have a different set of columns (key-value pairs). It does not provide any relational integrity. It is up to the application developer to perform relation management.Read About Cassandra in full
In this article by Fazreil Amreen author of Instant GIMP Starter [Instant],Let's take a tour around GIMP for a start. This tour will give you an exposure to basic tasks to do with GIMP. Along the way, we will introduced to the GIMP conceptual idea that makes it different than some of the other image manipulation programs.Read A Tour Around GIMP in full
This article by Dr. Jayaram Krishnaswamy teaches how you may create a .NET Compact Framework (CF) 2.0 forms application. This can be used with Pocket PC 2003, or later devices. In the absence of a device being available for testing, the emulator is the next best thing. The application will be tested on one of the many emulators available in Visual Studio 2005. You may try other devices as well just by choosing the item in the Device Emulation Manager described in the article.Read A Simple Pocket PC Application using Visual Studio 2005 in full
In this three-part article by David Studebaker, we will take a short tour through NAV 2009. Our path will be along the following trail:
- NAV 2009 from a functional point of view as an ERP system
- What's new in NAV 2009
- Definitions of terms as used in NAV
- The C/SIDE development environment and tools
- A development introduction to the various NAV object types
- Other useful NAV development information
Your goal in this article is to gain a reasonably complete, "big picture" understanding of NAV. When you complete this article, you should be able to communicate to a business manager or owner about the capabilities NAV can provide to help them manage their firm.Read A Short Tour through NAV 2009: Part 1 in full
Ephesoft has two user interfaces. One is intended for use by operators to review and validate Ephesoft's classification, separation, and extraction. The other is intended for use by system administrators in the configuration of Ephesoft. Not all aspects of Ephesoft can be configured through the administrative interface, however. For some of the configuration, administrators will need to use a text editor to modify files in Ephesoft's installation directory.
Before we begin, it is helpful to understand some commonly-used terms. A batch or a batch instance is a set of document images that are processed together. A batch class is a set of rules for processing a batch.
This article by Pat Myers, Ike Lavas, Michael Muller, and Clifford Laurin, authors of Intelligent Document Capture with Ephesoft, will provide you with a brief introduction to Ephesoft's user interfaces:
- The administrative user interface
- The operator user interface
In this article by Jayneil Dalal and Sohil Patel authors of Instant OpenCV Starter [Instant], we will be covering the fundamentals of image processing and help you write your first program in OpenCV by performing a few trivial tasks. All the examples throughout the book have been written in the C++ programming language.Read A quick start – OpenCV fundamentals in full
In the previous article we covered Python Image Manipulation. In this article by Ninad Sathaye, author of Python Multimedia Beginner's Guide, we will do an exciting project where we develop an image processing application with a graphical user interface.
This application will accept an image as an input and will create a resized image of that image. Although we are calling it a thumbnail maker, it is a multi-purpose utility that implements some basic image processing functionality.Read A Python Multimedia Application: Thumbnail Maker in full
This article by Nir Simionovich is all about AGI (Asterisk Gateway Interface)—its working, its three types, and the different frameworks.
Asterisk AGI enables an IVR developer to develop IVR structures that are sometimes, bordering on the absurd, as applications tend to become more and more complex by using AGI. However, there are some scenarios where common dialplan practices are no longer applicable, and the use of an external logic is a must. Enter AGI!Read A Primer to AGI: Asterisk Gateway Interface in full
This article by Todd Rosner the author of Learning AWS OpsWorks provides a high-level look at what AWS OpsWorks is, where OpsWorks came from, why it came to be, and why the service is important. One of the key drivers behind OpsWorks is something called DevOps, which you may or may not be aware of.Read A New Way to Scale in full