It is a rare school that lacks some sort of online personnel directory, whether a public-facing showcase or a private office phone list. This article by Erik Rose on Faculty/Staff Directory product fills both these niches and goes far beyond, letting you:
- Build department- or school-wide directories, collecting contact info, biographies, and more
- Divide people into groups according to their areas of expertise, committee or departmental affiliations, or other organization-specific criteria
- Use those divisions as access-control groups: for example, to grant all the members of a committee access to a private collaboration space
- Write plug-in extenders to track institution-specific pieces of information or hide pieces that don't apply in your organization
XAML browser applications also known as XBAPs have the features of a web application as well as those of rich client applications leveraging most of the capabilities of WPF. As web applications they can be published to a web server and can be browsed on IE and Firefox.
This article by Dr. Jayaram Krishnaswamy shows how to create a XBAP application using Visual Studio 2008; how to navigate between pages in the application; and how to deploy the application to the local intranet web server using built-in support in Visual Studio.Read Navigating Pages in XAML Browser Applications in full
This article by Mauricio Salatino, will give us a basic background into how the framework was built. We will be fully focused on the approach used to implement jBPM. This approach is called Graph Oriented Programming, and we will discuss and implement a basic solution with it. This will guide us to knowing about the framework internals with a simplistic vision. That will give us the power to understand the main guidelines used to build the entire framework.Read jBPM for Developers: Part 1 in full
Java Enterprise Edition can be considered to be nothing more than a set of specifications, or interfaces, for which service providers are required to provide implementations. While it is the actual implementation that does all the work, these specifications ensure that each implementation can assume that all its other collaborating pieces work as described by their interfaces. In theory, this allows complex software platforms (such as application servers) to be assembled from constituent implementations, each of which is sourced from a different vendor.
This article by Damodar Chetty introduces the reader to the Tomcat container. All the components of Tomcat are described with just enough detail, so as not to overwhelm the reader with too much information.Read An Overview of Tomcat 6 Servlet Container: Part 1 in full
This is the second part of the article series on An Introduction to JSF. In this article by Ian Hlavats, we will discuss about Standard JSF Validators and Internationalization in detail. Read An Introduction to JSF: Part 1 here.Read An Introduction to JSF: Part 2 in full
In this article by Ian Hlavats, we will discuss about JSF in detail. We will learn about:
- Model-View-Controller architecture
- JSF Request Processing Lifecycle
- Managed Beans
- EL Expressions
- UI Components
Read An Introduction to JSF: Part 1 in full
Oracle SQL Developer Data Modeler is available as an independent product, providing a focused data modeling tool for data architects and designers. There is also a Data Modeler Viewer extension to SQL Developer, which allows users to open previously created data models and to create read-only models of their database schemas. SQL Developer Data Modeler is a vast tool, supporting the design of logical Entity Relationship Diagrams, and relational models, with forward and reverse engineering capabilities between the two. It supports multi-dimensional, data flow, data type, and physical models, and allows files to be imported from a variety sources and exported to a variety of destinations. It allows users to set naming conventions and verify designs using a set of predefined design rules. Each of these topics is extensive, so in this two-part article by Sue Harper (author of Oracle SQL Developer 2.1) we'll review a few of the areas, illustrating how you can use them and highlight a few key features, using the independent, stand alone release of SQL Developer Data Modeler. We'll include a rief review of the integration points of the Data Modeler Viewer extension to SQL Developer. The product offers support for Oracle and non-Oracle Databases. In the interest of time and space, we have elected to only work with the Oracle database.Read Introducing SQL Developer Data Modeler: Part 1 in full
This article by Sue Harper is all about preparing your environment, installation, and getting started with SQL Developer.
SQL Developer is easy to set up and use. The best way to learn is by practice, and for that you'll need a computer with access to an Oracle database and SQL Developer. This article assumes you have a computer with Microsoft Windows, Linux, or Mac OS X installed, and that you have access to an Oracle database. It focuses on the alternative installations available for SQL Developer, where to find the product, and how to install it. Once your environment is set up, you can follow a quick product walk-through to familiarize yourself with the landscape. You'll create a few connections, touch on the various areas available (such as the SQL Worksheet and Reports navigator), and learn about the control of the windows and general product layout.Read Getting Started with SQL Developer: Part 1 in full
In this article by Jonathan Williamson, we will discuss about baking in blender. This article will cover all the essentials required to get started with baking in blender. We will discuss about the various types of baking and their uses which includes full render, ambient occlusion, shadow baking, normals, textures and also displacement.Read Learn Baking in Blender in full
The telecommunication and network security domain deals with the security of voice and data communications through local area, wide area, and remote access networking. The focus is to understand the networking models such as Open Systems Interconnect (OSI) and TCP/IP models, which are the most important models that follow a layered approach to networking, as well as the security mechanisms for Internet, Intranet, and Extranet in terms of firewalls, routers, and intrusion detection and protection systems.
The telecommunication and network security domain is one of the 10 domains of the Certified Information Systems Security Professional (CISSP) exam.
In this article by M.L.Srinivasan, we will discuss the following topics:
- Different protocols that are in transport layer, network/internet layer, and link layer in the TCP/IP model
- Some threats and vulnerabilities that are prevalent to such protocols
- Common attacks and possible countermeasures
- Important technologies and the security issues associated with them