The primary focus of The Elements of the Spring Web Flow Configuration File is to give you an in-depth look into the Spring Web Flow configuration file and its elements. In this article by Sven Lüppken, we will see which elements and their attributes are allowed in the Spring Web Flow configuration file. This article makes it easier to understand how the XML Schema definition file works, in case you have to take a look at the file of Spring Web Flow while you're configuring your flow.Read The Elements of the Spring Web Flow Configuration File in full
Ever since Microsoft started working on the ASP.NET MVC framework, one of the primary concerns was the framework's ability to re-use as many features as possible from ASP.NET Webforms. In this article by Maarten Balliauw, we will see how we can mix ASP.NET Webforms and ASP.NET MVC in one application and how data is shared between both these technologies.Read Mixing ASP.NET Webforms and ASP.NET MVC in full
Even though a trixbox system is a phone system, it is still a basic computer system like any other. One of the problems that we face is that extensions and VoIP service providers typically come into the system over the open Internet; this means that certain aspects of our system are wide open to the outside world. During the week that this article was written, several new scripts came out that allowed people to scan machines over the Internet, find systems that are running Asterisk, get the list of available extensions, and then hack the passwords. These tools allow a malicious hacker to get into your system and start making long-distance phone calls. There were numerous instances of companies with phone bills reaching into the thousands and even tens of thousands of dollars. Because of issues like this, it is more imperative than ever that you understand how to properly secure your trixbox server from the outside world. In this article by Kerry Garrison, we will focus on how to secure the trixbox server.Read Securing Your trixbox Server in full
Primarily, the Microsoft Office Outlook serves as an email application for a wide range of users. In the previous part of the article, we took an Overview of the Outlook object model and its features in VSTO. We saw the extensibility of Microsoft Office Outlook 2007 using the object model. We also learned to customize Microsoft Office Outlook menus and toolbars using VSTO. In the last part, we worked with form regions in Outlook, how to manipulate folders, contact information, and mail items using VSTO programming.
In this article by Vivek Thangaswamy, we will take a look at the following topics:
- Learning the concepts and seeing a demonstration of working with Outlook meetings and appointments
- Working with Ribbons for Outlook 2007
- Outlook applications and the Microsoft SQL Server 2008 database interaction
In this article by Michael Peacock, we will focus on creating a better selling experience for the customers of a store using a Drupal e-commerce website called 'Doug's Dinos!'.
In this article, we will learn:
- How to add a shopping cart
- How to add search features
- How to auto-create user accounts
- How to include images on our product listings
- How to provide discounts to customers based on their role
- How to enable coupons so customers can get discounts
The administration interface is a universal feature needed in any web application that stores and manages data. For this reason, Django comes with a fully fledged administration interface ready to be used. This administration interface is considered one of the coolest features in Django because it's easy to use, and yet is powerful and flexible. This article is based on the updated version- Django 1.0. The previous article on Creating an Administration Interface was on the older version of Django.
In this article by Ayman Hourieh, you will learn how to:
- Activate the administration interface
- Use the administration interface to manage content
Running a social web application means having a community of users who have common interests, and who use the application to share their interests and findings with each other. We will want to enhance the social experience of our users.
In this article by Ayman Hourieh, we will learn how to:
- Build a friend network feature
- Let users browse bookmarks of friends
Microsoft Office Outlook is one of the world's most widely-used personal information management tool. Primarily, the Microsoft Office Outlook serves as an email application for a wide range of users. In this article by Vivek Thangaswamy, you will learn the concepts of programming for Microsoft Office Outlook 2007 using VSTO 3.0 and C#. We will take a look at the following:
- An overview of the Outlook object model and its features in VSTO
- Learning the extensibility of Microsoft Office Outlook 2007 using the object model
- Learning to customize Microsoft Office Outlook menus and toolbars using VSTO
- Working with form regions in Outlook, manipulating folders, contact information, and mail items using VSTO programming
ADO.NET Data Services leverages the ADO.NET Entity Framework to build data services for relational data sources. These include support for MySQL, DB2, and Oracle in addition to MS SQL Server. It can also be used with non-relational data using an add-on provider model. With ADO.NET Data Services, the developers can build dynamic internet applications (AJAX, Silverlight, etc) that works across intranets as well as the internet. With this in place data access by applications is made possible using URI Syntax and using HTTP verbs operating on the data.
In this article by Dr. Jayaram Krishnaswamy, you will learn how to create a ADO.NET Data Service from scratch. You will also learn how you may access data using the URI constructs. The backend data for this tutorial comes from a copy of Northwind database named TestNorthwind on a named instance of SQL Server 2008. In order to work through this tutorial you should have Visual Studio 2008 SP1 installed. You also need to have .NET Framework 3.5 installed.Read Data Access with ADO.NET Data Services in full
As an administrator of an intranet website, you are required to provide an environment for employees to enjoy mailing, SMS text messaging with others. In this article by Jonas X. Yuan, we will discuss how to manage emails and then focus on SMS text messenger.
In this article we will learn how to:
- Manage (check, delete, forward, reply, search) mails.
- Set up mail portlet.
- Manage SMS text messenger portlet.
XDK 11g provides the Simple API for XML (SAX) and the Document Object Model (DOM) API for parsing an XML document. XDK 11g is included with JDeveloper 11g. XDK 11g parsers DOMParser and SAXParser may be configured for schema validation. In the previous article we discussed validating an XML document with an XML schema using XSDValidator. In this article by Deepak Vohra, we will discuss the procedure to validate an XML document with the SAXParser and the DOMParser.Read Schema Validation using SAX and DOM Parser with Oracle JDeveloper - XDK 11g in full
In the previous article, we saw module installation and how to add extra fields to our user profiles. In this article by Michael Peacock we will look into customizing user activity in Drupal 6 Social Networking.
Specifically, you will learn:
- About Gravatars(Globally Recognized Avatars) and how to enable them
- About settings and rules for users
- How users can track the activity of each other
- How to allow our users to customize their own blogs
- More about users, roles, and permissions
As an administrator of an intranet website, you are required to provide an environment for employees to enjoy chatting, instant messaging and others. This article by Jonas X. Yuan will introduce to us, how to enjoy instant messaging.
In this article we will learn how to:
- Add a participant for chatting.
- Manage (view and delete) participants in the chat portlet.
- Start chatting.
- Set up chat portlet.
An XML schema document defines the structure, content, and semantics for XML documents. We know the procedure to create an XML schema in JDeveloper and an XML document instance that conforms to the schema. But if you receive XML documents from another party, the validity of the documents has to be ascertained before the documents may be read and processed. This article by Deepak Vohra is about—validating an XML document with an XML schema. An instance document may be processed against a schema to verify whether the XML document conforms to the rules specified in the schema, a process called schema validation.Read Schema Validation with Oracle JDeveloper - XDK 11g in full