Home > Topics

Articles

Game Design Prototyping: Introducing the Unity Development Environment
This chapter discusses the game development tool Unity and explains why it is a great game development tool. It also looks at the sample project included with Unity and describes the Unity interface.
Continue reading...
By Jeremy GibsonAug 1, 2014
Introduction to Apache Cordova
This chapter is your introduction to the Apache Cordova framework and Apache Cordova application development. In the chapter, John Wargo describes what Cordova is, how it works, and how to develop applications using Cordova.
Continue reading...
By John M. WargoJul 31, 2014
The Evolution of Technical Information: Introduction to a Handbook for Writers and Editors
The authors of Developing Quality Technical Information: A Handbook for Writers and Editors, 3rd Edition introduce their book and discuss how writing and presenting technical information has evolved over the years.
Continue reading...
By Michelle Carey, Moira McFadden Lanyi, Deirdre Longo, Eric Radzinski, Shannon Rouiller, Elizabeth WildeJul 31, 2014
Cisco WSA – User Authentication with Transparent Proxy
In this video Natalie Timms covers integrating user authentication with Web Cache Communication Protocol (WCCP) based transparent proxy service on the Cisco Web Services Appliance (WSA). She shows how an existing Microsoft Active Directory user database can be leveraged to validate user credentials when determining if redirected traffic flows should be permitted through the WSA.
Continue reading...
By Natalie TimmsJul 30, 2014

See More Articles

Blogs

John  TraenkenschuhHow Long?

Traenk kept his Windows system from the Internet, from even starting, for some 45 days.  A lot can de-evolve in 45 days...  Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components?  Will Windows 9 fix the issues?

Continue reading...
By John TraenkenschuhCommentsJuly 29, 2014
Topics: Software Security,General Security and Privacy,Network Security,Security
John  TraenkenschuhEthical Hacker

It's time to take back the term hacker from the wanna-be's...

Continue reading...
By John TraenkenschuhCommentsJuly 29, 2014
Topics: Software Security,General Security and Privacy,Network Security,Security
Emily NaveThe IT List: What You Missed This Week on InformIT [7/25/14]

With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...
By Emily NaveCommentsJuly 25, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Process Improvement,Business & Management
Brad YaleWhy Open Source Matters: Musings from OSCON

With OSCON taking place in Oregon from 7/20/2014 – 7/24/2014, the Open Source community will come together to discuss everything new in the Open Source world. From OSS to Java, Python to PHP, Cloud Computing to Perl and emerging programming languages to mobile platforms, the Open Source community has a lot to chat about.

This said, I wanted to take the time to discuss why the Open Source initiative matters by highlighting a few key elements of the protocol which help to make it so powerful.

Continue reading...
By Brad YaleCommentsJuly 22, 2014
Topics: Other Applications,Home & Office Computing,Python,MySQL,PHP,Information Technology,Python,Programming,Open Source,Ruby/Ruby on Rails,Web Services,Graphics & Web Design,Perl,Web Development,Data,Mobile Application Development & Programming,Perl,Android,Ajax & JavaScript,Linux/UNIX/Open Source,PHP,Linux/UNIX/Open Source Operating Systems,HTML5 & Web Standards,Operating Systems, Server

See More Blogs

Other Topics

    Business & ManagementBusiness ApplicationsFinance & InvestingGeneral BusinessGlobal BusinessHuman ResourcesInformation ManagementManagement & StrategyPersonal DevelopmentSales & MarketingCertificationCisco CertificationCCDACCDPCCIECCIPCCNACCNPCCNP Security / CCSPCCNP Voice / CCVPCisco Qualified SpecialistCisco Networking AcademyCompTIAA+Network+Security+Microsoft CertificationMCADMCSAMCSDMCSEOther ITOther Non-TechnicalCloud Computing & VirtualizationDataAccessBusinessObjects/Crystal ReportsData Analytics and VisualizationDB2FileMakerInformation ManagementLotusMySQLSAPSQLSQL ServerEngineeringChemical EngineeringCommunications EngineeringGeneral Engineering & HardwareSemiconductor TechnologiesSix Sigma and Process ImprovementGraphics & Web DesignDreamweaver & FlashMicrosoft Expression StudioPhotoshop & AdobeVideo EditingHardwareUpgrading & RepairingHome & Office ComputingAppleeBay/Yahoo/GoogleEntertainment/Gaming/GadgetsHome NetworkingMac OS XMicrosoft ApplicationsMicrosoft Windows DesktopMicrosoft Windows ServerMicrosoft Windows Vista & Home ServerOther ApplicationsThe Web/Virtual Worlds/Social NetworkingInformation TechnologyMobile Application Development & ProgrammingAndroidHTML5 & Web StandardsiOSWindows PhoneNetworkingHome NetworkingNetwork Administration & ManagementNetwork Design & ArchitectureRouting & SwitchingStorageVoice/IP CommunicationsWireless/High Speed/OpticalOpen SourceAjax & JavaScriptLinux/UNIX/Open Source Operating SystemsPerlPHPPythonRuby/Ruby on RailsOperating Systems, ServerLinux/UNIX/Open SourceMAC OS X/OtherMicrosoft ServersMicrosoft System CenterMicrosoft Windows DesktopMicrosoft Windows Vista & Home ServerSolarisProcess ImprovementProgrammingAjaxAlgorithmsAndroidASP .NETC#C/C++GamesGeneral Programming/Other LanguagesGraphic ProgrammingHTML5/CSS/BlendJavaJavaScriptLotus Notes/Domino/XPagesMac and iOS ProgrammingPerlPHPPythonRationalRubyUser Interface (UI)Visual BasicVisual StudioWindows ProgrammingSecurityGeneral Security and PrivacyNetwork SecuritySoftware SecuritySoftware Development & ManagementAgileArchitecture and DesignManagement: Lifecycle, Project, TeamObject TechnologyRationalTestingUMLWeb DevelopmentAjax and JavaScriptASP.NETContent Management SystemsDreamweaver & FlashHTML/CSSMicrosoft Expression StudioPerlPHPPythonRuby/Ruby on RailsWeb ServicesCloud ComputingSOAWebSphereXML