This is the second part of the article series on An Introduction to JSF. In this article by Ian Hlavats, we will discuss about Standard JSF Validators and Internationalization in detail. Read An Introduction to JSF: Part 1 here.Read An Introduction to JSF: Part 2 in full
In this article by Ian Hlavats, we will discuss about JSF in detail. We will learn about:
- Model-View-Controller architecture
- JSF Request Processing Lifecycle
- Managed Beans
- EL Expressions
- UI Components
Read An Introduction to JSF: Part 1 in full
Oracle SQL Developer Data Modeler is available as an independent product, providing a focused data modeling tool for data architects and designers. There is also a Data Modeler Viewer extension to SQL Developer, which allows users to open previously created data models and to create read-only models of their database schemas. SQL Developer Data Modeler is a vast tool, supporting the design of logical Entity Relationship Diagrams, and relational models, with forward and reverse engineering capabilities between the two. It supports multi-dimensional, data flow, data type, and physical models, and allows files to be imported from a variety sources and exported to a variety of destinations. It allows users to set naming conventions and verify designs using a set of predefined design rules. Each of these topics is extensive, so in this two-part article by Sue Harper (author of Oracle SQL Developer 2.1) we'll review a few of the areas, illustrating how you can use them and highlight a few key features, using the independent, stand alone release of SQL Developer Data Modeler. We'll include a rief review of the integration points of the Data Modeler Viewer extension to SQL Developer. The product offers support for Oracle and non-Oracle Databases. In the interest of time and space, we have elected to only work with the Oracle database.Read Introducing SQL Developer Data Modeler: Part 1 in full
This article by Sue Harper is all about preparing your environment, installation, and getting started with SQL Developer.
SQL Developer is easy to set up and use. The best way to learn is by practice, and for that you'll need a computer with access to an Oracle database and SQL Developer. This article assumes you have a computer with Microsoft Windows, Linux, or Mac OS X installed, and that you have access to an Oracle database. It focuses on the alternative installations available for SQL Developer, where to find the product, and how to install it. Once your environment is set up, you can follow a quick product walk-through to familiarize yourself with the landscape. You'll create a few connections, touch on the various areas available (such as the SQL Worksheet and Reports navigator), and learn about the control of the windows and general product layout.Read Getting Started with SQL Developer: Part 1 in full
In this article by Jonathan Williamson, we will discuss about baking in blender. This article will cover all the essentials required to get started with baking in blender. We will discuss about the various types of baking and their uses which includes full render, ambient occlusion, shadow baking, normals, textures and also displacement.Read Learn Baking in Blender in full
The telecommunication and network security domain deals with the security of voice and data communications through local area, wide area, and remote access networking. The focus is to understand the networking models such as Open Systems Interconnect (OSI) and TCP/IP models, which are the most important models that follow a layered approach to networking, as well as the security mechanisms for Internet, Intranet, and Extranet in terms of firewalls, routers, and intrusion detection and protection systems.
The telecommunication and network security domain is one of the 10 domains of the Certified Information Systems Security Professional (CISSP) exam.
In this article by M.L.Srinivasan, we will discuss the following topics:
- Different protocols that are in transport layer, network/internet layer, and link layer in the TCP/IP model
- Some threats and vulnerabilities that are prevalent to such protocols
- Common attacks and possible countermeasures
- Important technologies and the security issues associated with them
In this article by Jacob Gube, we will look at:
- The $() and $$() function
- Selecting HTML elements with pseudo-class selectors
- Selecting HTML elements based on their attributes
So let’s get on with it...Read Selecting DOM Elements using MooTools 1.2: Part 1 in full
In this article by Markus Feilner, we will discuss the basic networking concepts of OpenVPN, and also have a brief look at the configuration. At the end of the article, OpenVPN is compared to IPsec, the quasi-standard in VPN technology. This article will cover the following:
- Networking with OpenVPN
- OpenVPN and firewalls
- Configuring OpenVPN
- OpenVPN versus IpSec
- Source for documentation
In the mid 1990s, the rise of the Internet and the increase in speed of cheap Internet connections paved the way for new technologies. This lead to the idea of providing secure connections between enterprise branches through low-cost lines using the Internet. This is a very basic description of what VPNs are all about.
In this article by Markus Feilner, we will discuss the features and advantages of OpenVPN followed by its release history.Read Advantages and History of OpenVPN in full
In the previous article on Creating a Web Application on JBoss AS 5, we saw how to install JSF on JBoss AS and we enhanced the Appstore Enterpirse application by adding a web layer to it.
In this article by Francesco Marchioni, we will cover in detail how to properly configure JBoss Web Server. Apache Tomcat provides the core functionality of JBoss Web Server. Its embedded engine allows seamless integration with JBoss components, by using the underlying Microkernel system.Read Configuring JBoss Application Server 5 in full
This article by Erlend Dalen, explains the different options to use when you need to search and retrieve a set of data from the database. It shows you how to create a query, how to create a view, and how to write different select statements.
In this article, you will learn about the different methods of retrieving data from the database. They are as follows:
- Queries which are reusable and often used in reports and periodic Jobs
- Views that are created in AOT and translated to optimized select statements at runtime
- Select statements to use in X++ to fetch data from the database to the application