Articles

Best of 2014: Save up to 50% off

RSS Feed Subscribe to this topic  RSS details

10643 Items

Sort by Date | Title

Hit the Ground Running with MongoDB and Python
By Stephen B. Morris
Sep 16, 2014
Stephen B. Morris describes how to get started with MongoDB and Python. As usual with Python, you can get productive quickly, without worrying about complex IDEs. MongoDB has a simple data model and easy-to-understand semantics, giving you a handy on-ramp to this interesting technology.
Create Your First Arduino Program
By Richard Blum
Sep 15, 2014
Write your first program and watch it work! In this excerpt from Arduino Programming in 24 Hours, Sams Teach Yourself, learn how to use the Arduino IDE software package to create, compile, and upload an Arduino program. You then learn how to interface your Arduino with external electronic circuits to complete your Arduino projects.
An Introduction to Data Visualization in JavaScript: How to Use Data-Joins in D3
By Ritchie S King
Sep 12, 2014
Data-joins are the bread and butter of D3. This chapter from Visual Storytelling with D3: An Introduction to Data Visualization in JavaScript covers how to use data-joins to add elements to a webpage and then manipulate them with data.
Migrating Users and Applications to Windows 8.1
By Don Poulton, Randy Bellet, Harry Holt
Sep 11, 2014
Learn how to migrate users and their profiles to Windows 8.1, configure folder redirection, and configure profiles in this chapter from MCSA 70-687 Cert Guide: Configuring Microsoft Windows 8.1.
CCIE Routing and Switching v5.0 Official Cert Guide: IP Forwarding (Routing)
By Narbik Kocharians, Peter Paluch
Sep 10, 2014
This chapter from CCIE Routing and Switching v5.0 Official Cert Guide, Volume 1, 5th Edition covers Cisco Express Forwarding concepts, routing protocol migration, and policy-based routing.
Init to Winit: Building Success with Swift Class Initializers
By Erica Sadun
Sep 9, 2014
Work carefully with Swift class initializers. If Objective-C is a big, warm, fuzzy teddy bear when it comes to initializers, Swift is a bespectacled, whip-carrying, leather-clad librarian with an attitude. Learn how to use convenience methods from subclasses without enraging the Swift tiger.
Learn Ruby the Hard Way: Comments and Pound Characters
By Zed A. Shaw
Sep 8, 2014
Comments are very important in your programs. They are used to tell you what something does in English, and they are used to disable parts of your program if you need to remove them temporarily. Zed Shaw shows you how to use them in Ruby, in this excerpt from Learn Ruby the Hard Way: A Simple and Idiomatic Introduction To The Imaginative World Of Computational Thinking With Code, 3rd Edition.
Making the Samsung Galaxy S5 Phone Your Own
By Steve Schwartz
Sep 5, 2014
In this chapter from My Samsung Galaxy S5, you find out how to customize your phone by populating the Home screen with widgets, shortcuts, and folders; change the default wallpaper; organize your Apps pages and create folders; set default and contact-specific ringtones; and configure and enable special system settings, such as Blocking mode and One-Handed Operation.
Selecting a Routing Protocol: CCNP Routing and Switching ROUTE 300-101
By Kevin Wallace
Sep 4, 2014
This lesson, excerpted from CCNP Routing and Switching ROUTE 300-101 Complete Video Course, identifies a variety of characteristics to consider when selecting a routing protocol. Also, common routing protocols (specifically, RIP, OSPF, EIGRP, and BGP) are categorized as a distance-vector, link-state, or path-vector routing protocol.
The Art of Computer Programming, Volume 3: Combinatorial Properties of Permutations
By Donald E. Knuth
Sep 3, 2014
In this excerpt from Art of Computer Programming, Volume 3: Sorting and Searching, 2nd Edition, Donald E. Knuth examines several properties of permutations and considers the general case where equal elements are allowed to appear. In the course of this study you will learn a good deal about combinatorial mathematics.
Building a Game from Scratch, Part 2: Coding the Game Logic
By Timothy L. Warner
Sep 2, 2014
It’s time to take our nascent game to the next level, adding enemy sprites, collision detection, and a custom "Game Over" screen. Timothy Warner prepares you to have fun and learn a bunch about programming computer games in Swift!
Preface to Improving Software Development Productivity: Effective Leadership and Quantitative Methods in Software Management
By Randall W. Jensen
Sep 2, 2014
In this preface to Improving Software Development Productivity: Effective Leadership and Quantitative Methods in Software Management, Randall Jensen introduces his book, which will help you measure your organization's capacity and productivity, and then use that information to improve multiple facets of developer and team performance, and to build more accurate estimates and schedules.
Why Performance Engineering? Why Performance Engineers?
By André B. Bondi
Sep 1, 2014
This chapter from Foundations of Software and System Performance Engineering: Process, Performance Modeling, Requirements, Testing, Scalability, and Practice describes the importance of performance engineering in a software project and explains the role of a performance engineer in ensuring that the system has good performance upon delivery. Overviews of different aspects of performance engineering are given.
Why Do We Still Have Software Development Problems?
By Randall W. Jensen
Aug 29, 2014
Why do software problems raised at a 1968 NATO Conference on Software Engineering still persist in much of the software development industry today, some 40 years later? In this chapter from Improving Software Development Productivity: Effective Leadership and Quantitative Methods in Software Management, Randy Jensen takes a look at at the main issues that continue to plague software projects.
GRE Tunnel Theory and Configuration: CCNP Routing and Switching ROUTE 300-101
By Kevin Wallace
Aug 28, 2014
This lesson, excerpted from CCNP Routing and Switching ROUTE 300-101 Complete Video Course, discusses the theory behind a Generic Routing Encapsulation (GRE) tunnel and describes how a GRE tunnel can be combined with an IPsec tunnel to add security. it concludes by configuring and verifying a GRE tunnel.
Performing Basic Troubleshooting on ESXi Hosts, vSphere Virtual Networks, and vSphere Storage
By Bill Ferguson
Aug 27, 2014
In this chapter from VCP5-DCV Official Certification Guide (Covering the VCP550 Exam): VMware Certified Professional 5 - Data Center Virtualization, 2nd Edition, Bill Ferguson discusses performing basic troubleshooting on your ESXi hosts, virtual networks, and storage.
The Advanced Strategy Guide to Minecraft: Mob Farms, Traps, and Defense
By Stephen O'Brien
Aug 26, 2014
Take control of the mayhem with a mob farm in Minecraft: the equivalent of a factory for zombies, spiders, creepers, and skeletons. You’ll quickly amass a fortune in useful resources, from gunpowder to string, arrows, and more, and also gather weapons, armor, iron, and even the occasional edible. Once you know how, it’s really quite easy, and putting together a mob farm, especially when playing on Survival, is incredibly satisfying. Stephen O'Brien shows you how in this chapter from The Advanced Strategy Guide to Minecraft.
12 More Essential Skills for Software Architects: Technology Innovation
By Dave Hendricksen
Aug 25, 2014
This chapter from 12 More Essential Skills for Software Architects unveils one of the essential skills needed by a software architect: the ability to identify, assess, and infuse new and potentially disruptive technologies in a business-centric fashion.
Building a Game from Scratch, Part 1: Setting the Foundation
By Timothy L. Warner
Aug 25, 2014
This article is the first in a multi-part series from the author of Sams Teach Yourself Scratch 2.0 in 24 Hours in which we create an online game by using the Scratch 2.0 educational programming language.
The Rise and Fall of Pointer Arithmetic in the Evolution of Memory Management
By Matt Weisfeld
Aug 25, 2014
Matt Weisfeld, author of The Object-Oriented Thought Process, Fourth Edition, discusses the advantages and hazards of using pointers to access and manipulate memory addresses directly. The risks are significant enough that some languages allow this feature, while others expressly prohibit it. What's so dangerous - and tantalizingly powerful - about pointer arithmetic?

1 2 3 4 5 Next >