Home > Topics

Articles

Customizing Android to Your Liking in Your Samsung Galaxy Tab 4
Learn how to customize Android settings on your Galaxy Tab 4, including creating password protection, setting parental restrictions, changing the date and time, modifying your wallpaper, setting alert sounds, and changing keyboard settings, in this excerpt from My Samsung Galaxy Tab 4.
Continue reading...
By Eric Butow, Lonzell WatsonOct 23, 2014
Tom BunzelCamtasia Studio QuickStart Guide for Authors, Part 2: Using Postproduction Features to Edit, Enhance, and Produce Your Video
Tom Bunzel, author of Solving the PowerPoint Predicament: Using Digital Media for Effective Communication, concludes his two-part series on TechSmith's Camtasia by showing how to edit, customize, and produce your specialized video and audio projects with Camtasia Editor.
Continue reading...
By Tom BunzelOct 22, 2014
Introduction to Oracle Databases on Virtual Infrastructure
99.9% of all database or data management systems should be considered candidates for virtualization on vSphere. In this chapter from Virtualizing Oracle Databases on vSphere, the authors argue that Oracle databases and software are prime candidates to consider migrating to virtualized infrastructure.
Continue reading...
By Kannan Mani, Don SullivanOct 22, 2014
Errin O'ConnorOverview of SharePoint 2013’s Social Computing Capabilities
Social collaboration in the workplace has been embraced by some organizations and really shunned by others due to possible legal and compliance concerns. Both types of organizations, those who embrace it and those who feel the ROI does not outweigh the risk, have valid points and underlying driving reasons for their overall stance on this subject. SharePoint expert Errin O’Connor tries to shed light on the capabilities of SharePoint 2013’s Social capabilities and discuss the ways your organization may be able to embrace these to provide real value to your organization.
Continue reading...
By Errin O'ConnorOct 21, 2014

See More Articles

Blogs

Brad YaleHow the Internet Works: The Deep Web

The Deep Web. The Deepnet. The Invisible Web. The Hidden Web. 

Maybe you have heard of the Deep Web. Maybe you even know how to access the Deep Web. 

Chances are though, you've never heard of the Deep Web and you have no idea how to access it. The Deep Web sounds mysterious, elusive and somewhat dangerous. By all accounts, it is all these things. 

So, what is the deep web? How does the deep web work? How do you access it?

In this installment of "How the Internet Works", we tackle the mysterious Deepnet.   

Continue reading...
By Brad YaleCommentsOctober 21, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Access,General Security and Privacy,Information Technology,Web Services,Information Management,Network Security,Data,Security,Business & Management
Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing
Brad YaleMobile Malware and Fake Apps: Hong Kong, China and The New York Times

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...
By Brad YaleCommentsOctober 2, 2014
Topics: Windows Phone,Software Security,General Security and Privacy,Information Technology,Open Source,iOS,Mobile Application Development & Programming,Android,Security,HTML5 & Web Standards
Heather FoxQ&A with 2014 Jolt Award Winner: "Python in Practice" Author Mark Summerfield

Dr. Dobb's has announced the results of its annual Jolt Awards in the Best Books Category. The awards cover nominated books published during the twelve months ending June 30th. A total of 9 judges reviewed dozens of nominations to ultimately announce The Jolt Award for the year's best book, along with two Jolt Productivity and three Jolt Finalist awards.

The Jolt Award-winning Author for 2014 is (...drum roll...) Mark Summerfield, who here discusses his lauded book, Python in Practice: Create Better Programs Using Concurrency, Libraries and Patterns.

Continue reading...
By Heather FoxCommentsOctober 1, 2014
Topics: Python,Open Source

See More Blogs

Other Topics

Business & ManagementBusiness ApplicationsFinance & InvestingGeneral BusinessGlobal BusinessHuman ResourcesInformation ManagementManagement & StrategyPersonal DevelopmentSales & MarketingCertificationCisco CertificationCCDACCDPCCIECCIPCCNACCNPCCNP Security / CCSPCCNP Voice / CCVPCisco Qualified SpecialistCisco Networking AcademyCompTIAA+Network+Security+Microsoft CertificationMCADMCSAMCSDMCSEOther ITOther Non-TechnicalCloud Computing & VirtualizationDataAccessBusinessObjects/Crystal ReportsData Analytics and VisualizationDB2FileMakerInformation ManagementLotusMySQLSAPSQLSQL ServerEngineeringChemical EngineeringCommunications EngineeringGeneral Engineering & HardwareSemiconductor TechnologiesSix Sigma and Process ImprovementGraphics & Web DesignDreamweaver & FlashMicrosoft Expression StudioPhotoshop & AdobeVideo EditingHardwareUpgrading & RepairingHome & Office ComputingAppleeBay/Yahoo/GoogleEntertainment/Gaming/GadgetsHome NetworkingMac OS XMicrosoft ApplicationsMicrosoft Windows DesktopMicrosoft Windows ServerMicrosoft Windows Vista & Home ServerOther ApplicationsThe Web/Virtual Worlds/Social NetworkingInformation TechnologyMobile Application Development & ProgrammingAndroidHTML5 & Web StandardsiOSWindows PhoneNetworkingHome NetworkingNetwork Administration & ManagementNetwork Design & ArchitectureRouting & SwitchingStorageVoice/IP CommunicationsWireless/High Speed/OpticalOpen SourceAjax & JavaScriptLinux/UNIX/Open Source Operating SystemsPerlPHPPythonRuby/Ruby on RailsOperating Systems, ServerLinux/UNIX/Open SourceMAC OS X/OtherMicrosoft ServersMicrosoft System CenterMicrosoft Windows DesktopMicrosoft Windows Vista & Home ServerSolarisProcess ImprovementProgrammingAjaxAlgorithmsAndroidASP .NETC#C/C++GamesGeneral Programming/Other LanguagesGraphic ProgrammingHTML5/CSS/BlendJavaJavaScriptLotus Notes/Domino/XPagesMac and iOS ProgrammingPerlPHPPythonRationalRubyUser Interface (UI)Visual BasicVisual StudioWindows ProgrammingSecurityGeneral Security and PrivacyNetwork SecuritySoftware SecuritySoftware Development & ManagementAgileArchitecture and DesignManagement: Lifecycle, Project, TeamObject TechnologyRationalTestingUMLWeb DevelopmentAjax and JavaScriptASP.NETContent Management SystemsDreamweaver & FlashHTML/CSSMicrosoft Expression StudioPerlPHPPythonRuby/Ruby on RailsWeb ServicesCloud ComputingSOAWebSphereXML