Filter Your Search

Filter Your Search
Web Development
Application Development
Big Data & Business Intelligence
Hardware & Creative
Networking & Servers
Game Development
Virtualization & Cloud
1   2   3   4   5  
View:   12   24   48  
Sort By:  
Dealing with Interrupts

This article is written by Francis Perea , the author of the book Arduino Essentials . In all our previous projects, we have been constantly looking for events to occur. We have been polling, but looking for events to occur supposes a relatively big effort and a waste of CPU cycles to only notice that nothing happened. In this article, we will learn about interrupts as a totally new way to deal with events, being notified about them instead of looking for them constantly. Interrupts may be really helpful when developing projects in which fast or unknown events may occur, and thus we will see a very interesting project which will lead us to develop a digital tachograph for a computer-controlled motor. Are you ready? Here we go!

The Alfresco Platform

In this article by Jeffrey T. Potts and Snehal K Shah , authors of Alfresco Developer Guide, Second Edition , we will discuss the Alfresco architecture.

Using Gerrit with GitHub

Using Gerrit code review with GitHub for cooperative software development.

Improving Plone 3 Product Performance

This article, by Juan Pablo Giménez and Marcos F. Romero , authors of Plone 3 Products Development Cookbook , will teach you how to reap the benefits of Plone by dealing with the problem of creating content types in which the objects’ final HTML rendering performs badly, and how to benchmark these improvements. We will cover: Installing CacheFu with a policy product Improving performance by tweaking expensive code Testing server load and benchmarking our code

Getting Started with Mudbox 2013

Sculpting software has changed the face of the 3D industry. Whether you are creating a character for the next Avatar movie or adding details to a post apocalyptic city in The Last of Us, 3D sculpting has become an essential tool for creating a level of realism in digital art that was much harder to achieve in the past. A couple of things that make Mudbox a better choice than other sculpting software is its ease of use, its industry-leading 3D painting tools, and its solid integration with other Autodesk products, which includes industry-standard software for 3D modeling and animation. Mudbox is also the first software to integrate vector displacement map extraction. This technology takes texture mapping one more step forward, similar to the introduction of normal maps which sparked the era of "Next-Gen" games. All in all, Mudbox is a powerful art creation tool that is only going to get better and more integrated with the industry's leading software. In this article by Jeremy Roland , author of Mudbox 2013 Cookbook we will cover: Installing Mudbox 2013 documentation Setting up hotkeys Increasing the resolution on your model Bookmarking the camera view Downloading and enabling stamps, stencils, and base meshes from the Internet Adding and adjusting your image planes Sculpting on different subdivision levels effectively Recording a movie while you work in Mudbox Setting up colors and other preferences Setting up your Wacom tablet Working in expert mode

Getting Started with Odoo Development

In this article by Daniel Reis , author of the book Odoo Development Essentials , we will see how to get started with Odoo. Odoo is a powerful open source platform for business applications. A suite of closely integrated applications was built on it, covering all business areas from CRM and Sales to Accounting and Stocks. Odoo has a dynamic and growing community around it, constantly adding features, connectors, and additional business apps. Many can be found at . In this article, we will guide you to install Odoo from the source code and create your first Odoo application. Inspired by the project, we will build a simple to-do application. It should allow us to add new tasks, mark them as completed, and finally, clear the task list from all already completed tasks

Puppet: Integrating External Tools

Puppet is a useful tool by itself, but you can get much greater benefits from using Puppet in combination with other tools and frameworks. We'll take a look at some of these. In this article by John Arundel , author of Puppet 2.7 Cookbook ,we will cover the following topics: Executing commands before and after Puppet runs Using Public modules Creating your own resource types Using MCollective

Building robots that can walk

In this article, by Richard Grimmett , author of Mastering BeagleBone Robotics , you'll build a quadruped, that is, a robot with four legs. You'll be using 12 servos so that each leg has three points that can move, or three Degrees of Freedom ( DOF ). In this project, you'll control 12 servos at the same time, so it will make more sense to use an external servo controller that can supply the control signals and supply voltages for all the 12 servos.

Role Management

In this article by Gavin Henrick and Karen Holland , author of the book Moodle Administration Essentials , roles play a key part in the ability of the Moodle site. They are able to restrict the access of users to only the data they should have access to, and whether or not they are able to alter it or add to it. In each course, every user will have been assigned a role when they are enrolled, such as teacher, student, or customized role. In this article, we deal with the essential areas of role management that every administrator may have to deal with: Cloning a role Creating a new role Creating a course requester role Overriding a permission in a role in a course Testing a role Manually adding a role to a user in a course Enabling self-enrolment for a course

Introducing vSphere vMotion

In this article by Abhilash G B and Rebecca Fitzhugh author of the book Learning VMware vSphere , we are mostly going to be talking about howvSphere vMotion is a VMware technology used to migrate a running virtual machine from one host to another without altering its power-state. The beauty of the whole process is that it is transparent to the applications running inside the virtual machine. In this section we will understand the inner workings of vMotion and learn how to configure it. There are different types of vMotion, such as: Compute vMotion Storage vMotion Unified vMotion Enhanced vMotion (X-vMotion) Cross vSwitch vMotion Cross vCenter vMotion Long Distance vMotion

Sprites in Action

In this article by Milcho G. Milchev , author of the book SFML Essentials , we will see how we can use SFML to create a customized animation using a sequence of images. We will also see how SFML renders an animation. Animation exists in many forms. The traditional approach to animation is drawing a sequence of images which differ slightly from each other, and showing them on a screen one after the other. Even though this approach is still widely used, there are more elegant alternatives. For example, drawing (or modelling in 3D) only the limbs of a character and then animating how they move relative to time is a technique that saves a lot of time for artists. It also creates smoother results because not every frame of the animation has to be redrawn. In this book, we are going to explore only the traditional approach, since it is the simpler solution for programmers, and in many cases it is enough to bring life to any sprite.

Getting Started with Spring Security

In this article, we'll apply a minimal Spring Security configuration to start addressing the inadvertent privilege escalation due to lack of URL protection and general authentication. We will then build on the basic configuration to provide a customized experience for our users. This article by Robert Winch , author of Spring Security 3.1 , will get you up and running with Spring Security and will provide you with a foundation for any other security-related tasks you will need to perform. During the course of this article, we will: Implement a basic level of security on the JBCP Calendar application, using Spring Security's automatic configuration option Learn how to customize both the login and logout experience Configure Spring Security to restrict access differently, depending upon the URL Leverage Spring Security's expression-based access control Conditionally display basic information about the logged-in user using Spring Security's JSP library Determine the user's default location after login, based upon role

1   2   3   4   5  
View:   12   24   48  
Sort By: