Articles

RSS Feed Subscribe to this topic  RSS details

10596 Items

Sort by Date | Title

1.
Cisco WSA – User Authentication with Transparent Proxy
Jul 30, 2014
In this video Natalie Timms covers integrating user authentication with Web Cache Communication Protocol (WCCP) based transparent proxy service on the Cisco Web Services Appliance (WSA). She shows how an existing Microsoft Active Directory user database can be leveraged to validate user credentials when determining if redirected traffic flows should be permitted through the WSA.
2.
Evernote for iPad: Your New Best Friend
Jul 30, 2014
This chapter introduces Evernote and shows some of the useful tools and features that make it a worthy app and service for your own Ultimate iPad.
3.
Preface to 12 More Essential Skills for Software Architects
Jul 30, 2014
Dave Hendricksen introduces his book, 12 More Essential Skills for Software Architects; learn the three sets of skills that will have the greatest impact on your ability to succeed and ascend.
4.
Preface to Art of Computer Programming, Volume 2: Seminumerical Algorithms, Third Edition
Jul 30, 2014
To mark the release of the official multi-format ebook of Donald Knuth's The Art of Computer Programming, Volume 2, we are pleased to make available the preface.
5.
Background Tasks in Windows 8.1
By Jeremy Likness
Jul 29, 2014
Windows Store apps are designed to remain alive and connected even when they are not running. Your app may need to fetch data from a remote server, download large files in the background, scan the file system for changes, or connect with a web service to retrieve updates while the user is performing other tasks. Fortunately, the Windows Runtime (WinRT) provides a mechanism referred to as background tasks that provides this functionality. In this article, Microsoft MVP for Silverlight Jeremy Likness shows you the variety of tasks that are available from updating information on the lock screen, raising alerts from incoming messages, to playing audio in the background and receiving data only when the connection is not metered.
6.
Service-Orientation Principles with Java Web-Based Services
By Thomas Erl, Raj Balasubramanian, David Chou, Thomas Plunkett, Satadru Roy, Philip Thomas, Andre Tost
Jul 29, 2014
This chapter visits each of the eight service-orientation principles in depth to highlight considerations specific to design and development with Java.
7.
Introduction to "SOA with Java"
By Thomas Erl, Raj Balasubramanian, David Chou, Thomas Plunkett, Satadru Roy, Philip Thomas, Andre Tost
Jul 28, 2014
Thomas Erl et al. describe the objectives and organization of their book, SOA with Java: Realizing Service-Orientation with Java Technologies, explain who the book is for, and what is not actually covered.
8.
iOS Developer's Cookbook: Sprite Kit Label Shadows
By Erica Sadun
Jul 28, 2014
Let your Sprite Kit labels pop by automatically adding shadows. Shadow node children add contrast and visibility.
9.
Organizational Culture Considerations with Agile
By Sondra Ashmore, Kristin Runyan
Jul 24, 2014
The organizational culture impacts to an Agile transformation are profound. Successful implementations need support from the team members, management, and executives to embrace new ways of completing work and collaborating. Every role in the organization will be affected in some way, and by understanding what is different and what drives success in each role, we are better positioned for the increase in productivity, responsiveness, and customer satisfaction that can be delivered by becoming Agile.
10.
Improving the Design and Implementation of Object-Oriented Code: The Ongoing Quest for Data Integrity
By Matt Weisfeld
Jul 23, 2014
Matt Weisfeld, author of The Object-Oriented Thought Process, Fourth Edition, travels through time to show the evolution of accessor methods to improve data security and integrity in both structured programming and object-oriented programming. Along the way, we learn about the mechanisms in place today to help produce robust and secure code.
11.
Strategies for App Development Success: What Could Possibly Go Wrong?
By Carl Brown
Jul 23, 2014
Carl Brown details the numerous steps within the app development process when things can go horribly wrong -- and provides some tips about what can be done about them.
12.
Cisco ASA Licensing
By Andrew Ossipov, Jazib Frahim, Omar Santos
Jul 22, 2014
This chapter discusses license mechanisms for the Cisco ASA's advanced security features that add additional layers of protection or accommodate more complex network designs.
13.
Database Development: Comparing Python and Java ORM Performance
By Stephen B. Morris
Jul 22, 2014
Stephen B. Morris draws a comparison between two approaches to ORM-centric database development. One is based on the Python SQLAlchemy ORM tools, and the other uses standard Java JPA. Which is better? The result of comparing a simple use case for both languages is quite surprising.
14.
Introducing the Node.js-to-AngularJS Stack
By Brad Dayley
Jul 21, 2014
To get you off on the right foot, this chapter focuses on the fundamental components of the web development framework and then describes the components of the Node.js-to-AngularJS stack that is the basis for the rest of the book.
15.
iOS Developer's Cookbook: Visualizing Sprite Kit
By Erica Sadun
Jul 21, 2014
When working with Sprite Kit, determining exactly where items will appear and what size they'll occupy can be a tricky proposition. Here are a few tips to help you visualize the way your iOS Sprite Kit scenes are put together.
16.
Learn Socket Programming with Python
By Jesse Smith
Jul 17, 2014
Programming expert Jesse Smith shows you how to use Python to program socket applications. You will learn about the various socket types and how to apply them.
17.
Working with User Input Devices in the Windows Runtime
By Jeremy Likness, John Garland
Jul 17, 2014
In this chapter from Programming the Windows Runtime by Example: A Comprehensive Guide to WinRT with Examples in C# and XAML, you see how the WinRT APIs provide a common model for working with the various kinds of input pointer devices. This model provides a range of access, allowing you not only to obtain information about raw pointer events, but also to work with higher-level abstract gestures, depending on the needs of your app. You also see how you can access keyboard events from your code and obtain information about the user’s key presses.
18.
Preface to Introduction to Agile Methods
By Sondra Ashmore, Kristin Runyan
Jul 16, 2014
Sondra Ashmore and Kristin Runyan introduce their book, Introduction to Agile Methods, the place to start for students and professionals who want to understand Agile and become conversant with Agile values, principles, framework, and processes.
19.
VCAP5-DCA Official Cert Guide: Network Administration
By John B. Davis, Steve Baca
Jul 16, 2014
This chapter provides the knowledge and skills needed to successfully configure and administer an enterprise network that includes virtual networks built using vSphere.
20.
CCIE Security v4.0 Practice Lab
By Natalie Timms
Jul 15, 2014
In this practice lab to help in your preparation for the CCIE Security exam, Natalie Timms focuses on initializing and configuring the Cisco Adaptive Security Appliance (ASA) in both single- and multi-context modes.

1 2 3 4 5 Next >