Articles

RSS Feed Subscribe to this topic  RSS details

10457 Items

Sort by Date | Title

1.
Accessing Shared Atomic Objects from within a Signal Handler in C
By Robert C. Seacord
Apr 24, 2014
Robert C. Seacord, author of Secure Coding in C and C++, Second Edition, describes how accessing shared objects in signal handlers can result in race conditions that can leave data in an inconsistent state. Historically, the only conforming way to access a shared object from a signal handler was to read from or write to variables of type volatile sig_atomic_t. With the advent of C11, atomics are now a better choice for accessing shared objects in signal handlers.
2.
Five Interaction Design Tips for Your Mobile App
By Cameron Banga, Josh Weinhold
Apr 24, 2014
Apps for mobile platforms might seem simple, but they're far from it. Programs that run on smartphones and tablets have their own style and rules, which are far different from the protocols and techniques established on their desktop computer ancestors. Cameron Banga and Josh Weinhold share five tips for perfecting your app designs in ways that will help you meet or exceed your users' expectations.
3.
Introduction to Inventory Management: Principles and Strategies for the Efficient Flow of Inventory across the Supply Chain
By CSCMP, Terry L. Esper, Matthew A. Waller
Apr 24, 2014
Inventory is a fundamental measure of the overall health of supply chain and logistics activities. The authors of The Definitive Guide to Inventory Management discuss what inventory is, the role of inventory in supply chain management, and why inventory is such an important metric in supply chain management.
4.
First Sketches of an App
By Cameron Banga, Josh Weinhold
Apr 23, 2014
In this chapter you’ll find a general strategic outlay for planning the design of a mobile application. Using the steps and techniques presented, you’ll be prepared for the different phases a design evolves through during its infancy, before a programmer writes the first lines of code.
5.
Java SE 8's New Language Features, Part 2: Predefined Functional Interfaces, Method References, and More
By Jeff Friesen
Apr 22, 2014
Java 8 has significantly evolved the Java language by adding support for default and static methods to interfaces, by introducing lambda expressions and functional interfaces, and more. In Part 2 of a two-part series on Java 8 language features, Jeff Friesen introduces you to predefined functional interfaces, method references, enhanced generic type inference, and type annotations.
6.
Using Object-Oriented Features in Objective-C
By Jesse Feiler
Apr 22, 2014
This chapter explains the messaging structure that is at the heart of Objective-C., using the common alloc and init methods as examples.
7.
Networking for VMware Administrators: The vSphere Standard Switch
By Christopher Wahl, Steven Pantol
Apr 21, 2014
This chapter explains and describes the vSphere Standard Switch, the original recipe vSwitch included with every VMware license level. This switch includes many features to help shuffle traffic around your network.
8.
Quis custodiet ipsos custodes? Going Heisenberg on iOS' NSNotificationCenters
By Erica Sadun
Apr 21, 2014
You may think your observers are well behaved, but are they? With modern block-based NSNotificationCenters, you may be leaking without ever realizing it. Erica Sadun shows how to clean things up.
9.
Editing and Correcting Movie Clips in iMovie
By Cheryl Brumbaugh-Duncan, Craig Johnston
Apr 18, 2014
In this chapter, you find out how to modify your clips in a movie project by editing and correcting the clips in their duration or orientation as well as correcting video that is shaky or blurry.
10.
Cisco Networking Academy's Introduction to Scaling Networks
By Cisco Networking Academy
Apr 17, 2014
This chapter introduces strategies that can be used to systematically design a highly functional network, such as the hierarchical network design model, the Cisco Enterprise Architecture, and appropriate device selections.
11.
Security Program and Policies: Governance and Risk Management
By Sari Greene
Apr 16, 2014
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
12.
What it Takes to Hit #1 in Various Mac App Stores
By Erica Sadun
Apr 16, 2014
Erica Sadun tells the story about some of her own "successful" apps and explains why top chart positions in the Mac App Store may disappoint on earnings.
13.
CCNA Wireless 640-722 Cert Guide: Planning Coverage with Wireless APs
By David Hucaby
Apr 15, 2014
This chapter explains how wireless coverage can be adjusted and grown to scale over a greater area and a greater number of clients.
14.
Getting Started with Siri
By Erica Sadun, Steve Sande
Apr 15, 2014
In this chapter, you’ll learn how to get started with Siri: how to enable it, launch the service, and try it out. You’ll read about how to speak, how to recover from mistakes, and how to access Siri in a variety of ways.
15.
Reading Metadata and Marking Your Photos with iPhoto
By Michael Grothaus
Apr 14, 2014
In this chapter, you learn how to use iPhoto to easily view all the extra information, such as shutter speed and aperture, you recorded when taking your photos and how to mark your imported photos by flagging, rating, and adding keywords to them.
16.
View, Organize, Edit, and Share Pictures Using the Photos App on your iPhone or iPad
By Jason Rich
Apr 11, 2014
Jason R. Rich shows how to use the iOS 7's built-in apps to view, manage, edit, and share photos on your iPhone, iPad, or iPod Touch.
17.
Creating an Agile Culture through Trust and Ownership: An Interview with Pollyanna Pixton and Niel Nickolaisen
By Phil Windley, Niel Nickolaisen, Pollyanna Pixton
Apr 10, 2014
Phil Windley talks to Pollyanna Pixton and Niel Nickolaisen about their book, The Agile Culture: Leading through Trust and Ownership, why command and control management doesn't work with software teams, and why really trusting your team can make all the difference in your products, your work environment, and employee quality, satisfaction, and retention.
18.
Introduction to Classes, Objects, Methods and Strings in Java SE8
By Harvey Deitel, Paul Deitel
Apr 9, 2014
This chapter shows how to create your own Java classes and methods, presenting a case study on creating and using a simple, real-world bank account class — Account. This chapter also introduces data type double to represent an account balance as a number that can contain a decimal point—such numbers are called floating-point numbers.
19.
Why the 3.5" Form Factor Still Matters - Even in the Age of the iPhone 5S and Later
By Erica Sadun
Apr 9, 2014
It’s good to be regularly reminded about non-obvious testing targets that you might not have been thinking about. Here are some extra reasons you should continue targeting the 3.5” form factor for the foreseeable future.
20.
Cisco Networking Academy's Introduction to VLANs
By Cisco Networking Academy
Apr 7, 2014
This chapter will cover how to configure, manage, and troubleshoot VLANs and VLAN trunks. It will also examine security considerations and strategies relating to VLANs and trunks, and best practices for VLAN design.

1 2 3 4 5 Next >