Filter Your Search

Filter Your Search
Web Development
Application Development
Hardware & Creative
Networking & Servers
Big Data & Business Intelligence
Game Development
Virtualization & Cloud
1   2   3   4   5  
View:   12   24   48  
Sort By:  
iOS Security Overview

In this article by Allister Banks and Charles S. Edge , the authors of the book,  Learning iOS Security , we will go through an overview of the basic security measures followed in an iOS. Out of the box, iOS is one of the most secure operating systems available. There are a number of factors that contribute to the elevated security level. These include the fact that users cannot access the underlying operating system. Apps also have data in a silo (sandbox), so instead of accessing the system's internals they can access the silo. App developers choose whether to store settings such as passwords in the app or on iCloud Keychain, which is a secure location for such data on a device. Finally, Apple has a number of controls in place on devices to help protect users while providing an elegant user experience. However, devices can be made even more secure than they are now. In this article, we're going to get some basic security tasks under our belt in order to get some basic best practices of security. Where we feel more explanation is needed about what we did on devices, we'll explore a part of the technology itself in this article. This article will cover the following topics: Pairing Backing up your device Initial security checklist Safari and built-in app protection Predictive search and spotlight

Entity Framework Code-First: Accessing Database Views and Stored Procedures

In this article by Sergey Barskiy , author of the book Code-First Development using Entity Framework , you will learn how to integrate Entity Framework with additional database objects, specifically views and stored procedures. We will see how to take advantage of existing stored procedures and functions to retrieve and change the data. You will learn how to persist changed entities from our context using stored procedures. We will gain an understanding of the advantages of asynchronous processing and see how Entity Framework supports this concept via its built-in API. Finally, you will learn why concurrency is important for a multi-user application and what options are available in Entity Framework to implement optimistic concurrency.

The Observer Pattern

In this article, written by Leonardo Borges , the author of Clojure Reactive Programming , we will: Explore Rx's main abstraction: Observables Learn about the duality between iterators and Observables Create and manipulate Observable sequences


In this article by Deepak Vohra, author of the book, Advanced Java® EE Development with WildFly® you will see how to create a Java EE project and its pre-requisites. The objective of the EJB 3.x specification is to simplify its development by improving the EJB architecture. This simplification is achieved by providing metadata annotations to replace XML configuration. It also provides default configuration values by making entity and session beans POJOs ( Plain Old Java Objects ) and by making component and home interfaces redundant. The EJB 2.x entity beans is replaced with EJB 3.x entities. EJB 3.0 also introduced the Java Persistence API ( JPA ) for object-relational mapping of Java objects. WildFly 8.x supports EJB 3.2 and the JPA 2.1 specifications from Java EE 7. The sample application is based on Java EE 6 and EJB 3.1. The configuration of EJB 3.x with Java EE 7 is also discussed and the sample application can be used or modified to run on a Java EE 7 project. We have used a Hibernate 4.3 persistence provider. Unlike some of the other persistence providers, the Hibernate persistence provider supports automatic generation of relational database tables including the joining of tables. In this article, we will create an EJB 3.x project. This article has the following topics: Setting up the environment Creating a WildFly runtime Creating a Java EE project

Cassandra Architecture

In this article by Nishant Neeraj , the author of the book Mastering Apache Cassandra - Second Edition , aims to set you into a perspective where you will be able to see the evolution of the NoSQL paradigm. It will start with a discussion of common problems that an average developer faces when the application starts to scale up and software components cannot keep up with it. Then, we'll see what can be assumed as a thumb rule in the NoSQL world: the CAP theorem that says to choose any two out of consistency, availability, and partition-tolerance. As we discuss this further, we will realize how much more important it is to serve the customers (availability), than to be correct (consistency) all the time. However, we cannot afford to be wrong (inconsistent) for a long time. The customers wouldn't like to see that the items are in stock, but that the checkout is failing. Cassandra comes into picture with its tunable consistency.

Understanding and Creating Simple SSRS Reports

In this article by Deepak Agarwal and Chhavi Aggarwal , authors of the book Microsoft Dynamics AX 2012 R3 Reporting Cookbook , we will cover the following topics: Grouping in a report Adding ranges to a report Deploying a report Creating a menu item for a report Creating a report using a query in Warehouse Management

Storm for Real-time High Velocity Computation

In this article by Shilpi Saxena , author of the book Real-time Analytics with Storm and Cassandra , we will cover the following topics: What's possible with data analysis? Real-time analytics—why is it becoming the need of the hour Why storm—the power of high speed distributed computations We will get you to think about some interesting problems along the lines of Air Traffic Controller ( ATC ), credit card fraud detection, and so on. First and foremost, you will understand what is big data. Well, big data is the buzzword of the software industry but it's much more than the buzz in reality, it's really a huge amount of data.

Geocoding Address-based Data

In this article by Kurt Menke, GISP , Dr. Richard Smith Jr., GISP , Dr. Luigi Pirelli , Dr. John Van Hoesen, GISP , authors of the book Mastering QGIS , we'll have a look at how to geocode address-based date using QGIS and MMQGIS.

Factor variables in R

This article by Jaynal Abedin and Kishor Kumar Das , authors of the book Data Manipulation with R Second Edition , will discuss factor variables in R. In any data analysis task, the majority of the time is dedicated to data cleaning and preprocessing. Sometimes, it is considered that about 80 percent of the effort is devoted to data cleaning before conducting the actual analysis. Also, in real-world data, we often work with categorical variables. A variable that takes only a limited number of distinct values is usually known as a categorical variable, and in R, it is known as a factor . Working with categorical variables in R is a bit technical, and in this article, we have tried to demystify this process of dealing with categorical variables.

The BSP Layer

In this article by Alex González , author of the book  Embedded LinuxProjects Using Yocto Project Cookbook , we will see how the embedded Linux projects require both custom hardware and software. An early task in the development process is to test different hardware reference boards and the selection of one to base our design on. We have chosen the Wandboard, a Freescale i.MX6-based platform, as it is an affordable and open board, which makes it perfect for our needs. On an embedded project, it is usually a good idea to start working on the software as soon as possible, probably before the hardware prototypes are ready, so that it is possible to start working directly with the reference design. But at some point, the hardware prototypes will be ready and changes will need to be introduced into Yocto to support the new hardware. This article will explain how to create a BSP layer to contain those hardware-specific changes, as well as show how to work with the U-Boot bootloader and the Linux kernel, components which are likely to take most of the customization work.

Security in Microsoft Azure

In this article, we highlight some security points of interest, according to the ones explained in the book  Microsoft Azure Security , by Roberto Freato . Microsoft Azure is a comprehensive set of services, which enable Cloud computing solutions for enterprises and small businesses. It supports a variety of tools and languages, providing users with building blocks that can be composed as needed. Azure is actually one of the biggest players in the Cloud computing market, solving scalability issues, speeding up the entire management process, and integrating with the existing development tool ecosystem.

Zoom and Turn

In this article by Charlotte Olsson and Christina Hoyer , the authors of the book  Prezi Cookbook , we will cover the following recipes: Zoom in Zoom out Zooming with frames Zooming out with frames Zooming in with frames Turns Turning an element Turning a frame Anatomy of a turn Combining turns for elements and frames

1   2   3   4   5  
View:   12   24   48  
Sort By: