Articles

RSS Feed Subscribe to this topic  RSS details

10623 Items

Sort by Date | Title

CompTIA Security+ SY0-401 Authorized Cert Guide: OS Hardening and Virtualization
By David L. Prowse
Aug 5, 2014
This chapter focuses on the hardening of operating systems and the securing of virtual operating systems and will help you prepare for the CompTIA Security+ SY0-401 exam.
Introduction to Core HTML5 2D Game Programming
By David Geary
Aug 5, 2014
Learn how to implement a full-fledged HTML5 video game so that you can learn how to create one of your own. In this chapter, David Geary looks at the game Snail Bait from a high level to get a feel for its features and to understand some of the best practices it implements.
Joomla! Content Explained
By Stephen Burge
Aug 5, 2014
This chapter from Joomla! 3 Explained: Your Step-by-Step Guide, 2nd Edition explains the easiest and fastest way to add content to a Joomla site. If you follow this workflow, it will make your Joomla life very easy.
Xcode File Tricks
By Erica Sadun
Aug 4, 2014
Take charge of Xcode by learning essential file management tricks. You can discover ways to unbreak your heart and fix some red in your Xcode projects.
Game Design Prototyping: Introducing the Unity Development Environment
By Jeremy Gibson
Aug 1, 2014
This chapter discusses the game development tool Unity and explains why it is a great game development tool. It also looks at the sample project included with Unity and describes the Unity interface.
Introduction to Apache Cordova
By John M. Wargo
Jul 31, 2014
This chapter is your introduction to the Apache Cordova framework and Apache Cordova application development. In the chapter, John Wargo describes what Cordova is, how it works, and how to develop applications using Cordova.
The Evolution of Technical Information: Introduction to a Handbook for Writers and Editors
By Michelle Carey, Moira McFadden Lanyi, Deirdre Longo, Eric Radzinski, Shannon Rouiller, Elizabeth Wilde
Jul 31, 2014
The authors of Developing Quality Technical Information: A Handbook for Writers and Editors, 3rd Edition introduce their book and discuss how writing and presenting technical information has evolved over the years.
Cisco WSA: User Authentication with Transparent Proxy
By Natalie Timms
Jul 30, 2014
In this video Natalie Timms covers integrating user authentication with Web Cache Communication Protocol (WCCP) based transparent proxy service on the Cisco Web Services Appliance (WSA). She shows how an existing Microsoft Active Directory user database can be leveraged to validate user credentials when determining if redirected traffic flows should be permitted through the WSA.
Evernote for iPad: Your New Best Friend
By James Floyd Kelly
Jul 30, 2014
This chapter introduces Evernote and shows some of the useful tools and features that make it a worthy app and service for your own Ultimate iPad.
Preface to 12 More Essential Skills for Software Architects
By Dave Hendricksen
Jul 30, 2014
Dave Hendricksen introduces his book, 12 More Essential Skills for Software Architects; learn the three sets of skills that will have the greatest impact on your ability to succeed and ascend.
Preface to The Art of Computer Programming, Volume 2: Seminumerical Algorithms, 3rd Edition
By Donald E. Knuth
Jul 30, 2014
To mark the release of the official multi-format ebook of Donald Knuth's The Art of Computer Programming, Volume 2, we are pleased to make available the preface.
Background Tasks in Windows 8.1
By Jeremy Likness
Jul 29, 2014
Windows Store apps are designed to remain alive and connected even when they are not running. Your app may need to fetch data from a remote server, download large files in the background, scan the file system for changes, or connect with a web service to retrieve updates while the user is performing other tasks. Fortunately, the Windows Runtime (WinRT) provides a mechanism referred to as background tasks that provides this functionality. In this article, Microsoft MVP for Silverlight Jeremy Likness shows you the variety of tasks that are available from updating information on the lock screen, raising alerts from incoming messages, to playing audio in the background and receiving data only when the connection is not metered.
Service-Orientation Principles with Java Web-Based Services
By Thomas Erl, Raj Balasubramanian, David Chou, Thomas Plunkett, Satadru Roy, Philip Thomas, Andre Tost
Jul 29, 2014
This chapter visits each of the eight service-orientation principles in depth to highlight considerations specific to design and development with Java.
Introduction to "SOA with Java"
By Thomas Erl, Raj Balasubramanian, David Chou, Thomas Plunkett, Satadru Roy, Philip Thomas, Andre Tost
Jul 28, 2014
Thomas Erl et al. describe the objectives and organization of their book, SOA with Java: Realizing Service-Orientation with Java Technologies, explain who the book is for, and what is not actually covered.
iOS Developer's Cookbook: Sprite Kit Label Shadows
By Erica Sadun
Jul 28, 2014
Let your Sprite Kit labels pop by automatically adding shadows. Shadow node children add contrast and visibility.
Organizational Culture Considerations with Agile
By Sondra Ashmore, Kristin Runyan
Jul 24, 2014
The organizational culture impacts to an Agile transformation are profound. Successful implementations need support from the team members, management, and executives to embrace new ways of completing work and collaborating. Every role in the organization will be affected in some way, and by understanding what is different and what drives success in each role, we are better positioned for the increase in productivity, responsiveness, and customer satisfaction that can be delivered by becoming Agile.
Improving the Design and Implementation of Object-Oriented Code: The Ongoing Quest for Data Integrity
By Matt Weisfeld
Jul 23, 2014
Matt Weisfeld, author of The Object-Oriented Thought Process, Fourth Edition, travels through time to show the evolution of accessor methods to improve data security and integrity in both structured programming and object-oriented programming. Along the way, we learn about the mechanisms in place today to help produce robust and secure code.
Strategies for App Development Success: What Could Possibly Go Wrong?
By Carl Brown
Jul 23, 2014
Carl Brown details the numerous steps within the app development process when things can go horribly wrong -- and provides some tips about what can be done about them.
Cisco ASA Licensing
By Andrew Ossipov, Jazib Frahim, Omar Santos
Jul 22, 2014
This chapter discusses license mechanisms for the Cisco ASA's advanced security features that add additional layers of protection or accommodate more complex network designs.
Database Development: Comparing Python and Java ORM Performance
By Stephen B. Morris
Jul 22, 2014
Stephen B. Morris draws a comparison between two approaches to ORM-centric database development. One is based on the Python SQLAlchemy ORM tools, and the other uses standard Java JPA. Which is better? The result of comparing a simple use case for both languages is quite surprising.

< Prev 1 2 3 4 5 Next >

Become an InformIT Member

Take advantage of special member promotions, everyday discounts, quick access to saved content, and more! Join Today.