Articles

Filter Your Search

Search Articles
Category
Web Development
Application Development
Hardware & Creative
Networking & Servers
Big Data & Business Intelligence
Game Development
Virtualization & Cloud
Business
Series
Learning
Essentials
Cookbook
Blueprints
Mastering
Level
Starting
Progressing
1   2   3   4   5   Next
View:   12   24   48  
Sort By:  
Securing your Elastix System

In the Article by Gerardo Barajas Puente , author of  Elastix Unified Communications Server Cookbook , we will discuss some topics regarding security in our Elastix Unified CommunicationsSystem.Wewill sharesomerecommendationstoensureoursystem's availability,privacy,andcorrectperformance.Attackers'objectivesmayvaryfromdamaging data,todatastealing,totelephonicfraud,todenialofservice.This listis intendedtominimize any type of attack, but remember that there are no definitivearguments about security; it is a constantlychanging subjectwith newtypesofattacks,challenges,andopportunities. Therecipescoveredin this articleareasfollows: Using Elastix's embedded firewall Using the Security Advanced Settings menu to enable security features Recording and monitoring calls Recording MeetMe rooms (conference rooms) Recording queues' calls Monitoring recordings Upgrading our Elastix system Generating system backups Restoring a backup from one server to another

Getting Started with Intel Galileo

In this article by Onur Dundar , author of the book Home Automation with Intel Galileo , we will see how to develop home automation examples using the Intel Galileo development board along with the existing home automation sensors and devices. In the book, a good review of Intel Galileo will be provided, which will teach you to develop native C/C++ applications for Intel Galileo. After a good introduction to Intel Galileo, we will review home automation's history, concepts, technology, and current trends. When we have an understanding of home automation and the supporting technologies, we will develop some examples on two main concepts of home automation: energy management and security. We will build some examples under energy management using electrical switches, light bulbs and switches, as well as temperature sensors. For security, we will use motion, water leak sensors, and a camera to create some examples. For all the examples, we will develop simple applications with C and C++. Finally, when we are done building good and working examples, we will work on supporting software and technologies to create more user friendly home automation software. In this article, we will take a look at the Intel Galileo development board, which will be the device that we will use to build all our applications; also, we will configure our host PC environment for software development. The following are the prerequisites for this article: A Linux PC for development purposes. All our work has been done on an Ubuntu 12.04 host computer, for this article and others as well. (If you use newer versions of Ubuntu, you might encounter problems with some things in this article.) An Intel Galileo (Gen 2) development board with its power adapter. A USB-to-TTL serial UART converter cable; the suggested cable is TTL-232R-3V3 to connect to the Intel Galileo Gen 2 board and your host system. You can see an example of a USB-to-TTL serial UART cable at http://www.amazon.com/GearMo%C2%AE-3-3v-Header-like-TTL-232R-3V3/dp/B004LBXO2A. If you are going to use Intel Galileo Gen 1, you will need a 3.5 mm jack-to-UART cable. You can see the mentioned cable at http://www.amazon.com/Intel-Galileo-Gen-Serial-cable/dp/B00O170JKY/. An Ethernet cable connected to your modem or switch in order to connect Intel Galileo to the local network of your workplace. A microSD card. Intel Galileo supports microSD cards up to 32 GB storage.

GUI Components in Qt 5

In this article by Symeon Huang , author of the book Qt 5 Blueprints , explains typical and basic GUI components in Qt 5

PostgreSQL – New Features

In this article, Jayadevan Maymala , author of the book, PostgreSQL for Data Architects , you will see how to troubleshoot the initial hiccups faced by people who are new to PostgreSQL. We will look at a few useful, but not commonly used data types. We will also cover pgbadger, a nifty third-party tool that can run through a PostgreSQL log. This tool can tell us a lot about what is happening in the cluster. Also, we will look at a few key features that are part of PostgreSQL 9.4 release. We will cover a couple of useful extensions.

PostgreSQL Cookbook - High Availability and Replication

In this article by Chitij Chauhan , author of the book PostgreSQL Cookbook , we will talk about various high availability and replication solutions, including some popular third-party replication tools such as Slony-I and Londiste. In this article, we will cover the following recipes: Setting up hot streaming replication Replication using Slony-I Replication using Londiste

Basic Concepts of Machine Learning and Logistic Regression Example in Mahout

 In this article by Chandramani Tiwary , author of the book, Learning Apache Mahout , we will discuss some core concepts of machine learning and discuss the steps of building a logistic regression classifier in Mahout. The purpose of this article is to understand the core concepts of machine learning. We will focus on understanding the steps involved in, resolving different types of problems and application areas in machine learning. In particular we will cover the following topics: Supervised learning Unsupervised learning The recommender system Model efficacy

Geocoding Address-based Data

In this article by Kurt Menke, GISP , Dr. Richard Smith Jr., GISP , Dr. Luigi Pirelli , Dr. John Van Hoesen, GISP , authors of the book Mastering QGIS , we'll have a look at how to geocode address-based date using QGIS and MMQGIS.

How Vector Features are Displayed

In this article by Erik Westra , author of the book Building Mapping Applications with QGIS , we will learn how QGIS symbols and renderers are used to control how vector features are displayed on a map. In addition to this, we will also learn saw how symbol layers work. The features within a vector map layer are displayed using a combination of renderer and symbol objects. The renderer chooses which symbol is to be used for a given feature, and the symbol does the actual drawing.

Storm for Real-time High Velocity Computation

In this article by Shilpi Saxena , author of the book Real-time Analytics with Storm and Cassandra , we will cover the following topics: What's possible with data analysis? Real-time analytics—why is it becoming the need of the hour Why storm—the power of high speed distributed computations We will get you to think about some interesting problems along the lines of Air Traffic Controller ( ATC ), credit card fraud detection, and so on. First and foremost, you will understand what is big data. Well, big data is the buzzword of the software industry but it's much more than the buzz in reality, it's really a huge amount of data.

Puppet and OS Security Tools

In this article by Jason Slagle , author of the book Learning Puppet Security , covers using Puppet to manage SELinux and auditd. We learned a lot so far about using Puppet to secure your systems as, well as how to use it to make groups of systems more secure. However, in all of that, we've not yet covered some of the basic OS-level functions that are available to secure a system. In this article, we'll review several of those functions.

System Center Reporting

This article by the lead author Samuel Erskine , along with the co-authors Dieter Gasser , Kurt Van Hoecke , and Nasira Ismail , of the book Microsoft System Center Reporting Cookbook , discusses the drivers of organizational reporting and the general requirements on how to plan for business valued reports, steps for planning for the inputs your report data sources depends on, how you plan to view a report, the components of the System Center product, and preparing your environment for self-service Business Intelligence ( BI ). A report is only as good as the accuracy of its data source. A data source is populated and updated by an input channel. In this article, we will cover the following recipes: Understanding the goals of reporting Planning and optimizing dependent data inputs Planning report outputs Understanding the reporting schemas of System Center components Configuring Microsoft Excel for System Center data analysis

Understanding and Creating Simple SSRS Reports

In this article by Deepak Agarwal and Chhavi Aggarwal , authors of the book Microsoft Dynamics AX 2012 R3 Reporting Cookbook , we will cover the following topics: Grouping in a report Adding ranges to a report Deploying a report Creating a menu item for a report Creating a report using a query in Warehouse Management

1   2   3   4   5   Next
View:   12   24   48  
Sort By: