OpenID is a very popular form of trusted identity management that allows users to manage their identity through a single trusted provider. This convenient feature provides users with the security of storing their password and personal information with the trusted OpenID provider, optionally disclosing this personal information upon request. Additionally, the OpenID-enabled website can have confidence that the users providing OpenID credentials is who they say they are.
In this article by Peter Mularien, author of the book Spring Security 3, we will:
- Learn to set up our own OpenID in less than five minutes
- Configure the JBCP Pets website with a very rapid implementation of OpenID
- Learn the conceptual architecture of OpenID and how it provides your site with trustworthy user access
- Implement OpenID-based user registration
- Experiment with OpenID attribute exchange for user profile functionality
This article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, covers basic details about installing and configuring Joomla! for use on both local and remote servers. This article also contains information about where to obtain essential resources for learning, using, and optimizing Joomla!Read Installing and Configuring Joomla! on Local and Remote Servers in full
There are a number of electronic portfolios (e-portfolios) available to work with Moodle and they range in complexity and functionality. As they are a very personal thing, this article will try to give an overview of the most popular portfolios and a review of their main features in terms of supplementing Design Technology courses, as well as some examples of how they might be used to best effect.
In this article by Paul Taylor, author of the book Moodle 1.9 for Design and Technology, we will look at three popular portfolio applications:
Themes are among the most powerful features that can be used to customize a web site, especially in Plone. Using custom themes can help you brand your site for a particular corporate image; it ensures standards compliance and creates easily navigable layouts. But most Plone users still continue to use default themes as developing and deploying themes that are flexible and easily maintainable is not always straightforward.
In the article by Veda Williams, author of Plone 3 Theming, we will learn :
- About the theme
- Creating a theme product
- Altering the theme product's structure
- Installing the theme product
- Adjusting web site content to support the design
This article by Erik Rose, author of the book Plone 3 for Education, is a crash course in Plone 3 theme creation. After untangling Plone's confusing theming situation, we walk you through the development of a skeletal theme.Read Plone 3 Themes in full
Bad news is always good news for the press. This is why Vaughan Pyre has decided to take advantage of this fact and creates a website that will aggregate bad news and weird happenings from all over the world. In this article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, the content of the site will be entirely derived from Really Simple Syndication (RSS) feeds from several sources (each feed being automatically fetched and its items displayed on the website).
Weird Hap'nins requirements will be the need to:
- Get external feed sources and allocate them to menu links on the website
- Create the means to automatically fetch and display article items located in the feeds
- Display the latest content from all feed sources on the front page
Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences, report authors will need guidance.
In this article, by Abhishek Sanghani, author of IBM Cognos 8 Report Studio Cookbook, we will show you that even though macros are often considered a Framework Modeler's tool, they can be used within Report Studio as well. These recipes will show you some very useful macros around security, string manipulation, and prompting.Read Use of macros in IBM Cognos 8 Report Studio in full
Spring Python takes the concepts of the Spring Framework and Spring Security, and brings them to the world of Python. It isn't a simple line-by-line port of the code. Instead, it takes some powerful ideas that were discovered in the realm of Java, and pragmatically applies them in the world of Python.
Spring (Java) provides many simple, easy-to-use functional parts to assemble applications instead of a monolithic framework to extend. Spring Python uses this same approach. This means we can use as little or as much Spring Python as we need to get the job done for each Python application.
In this article by Greg Lee Turnquist, Author of Spring Python 1.1, we will show you how to rapidly write pure SQL queries without dealing with mind-numbing boilerplate code. It also shows how Spring Python works nicely with ORM-based persistence.Read Easily Writing SQL Queries with Spring Python in full
This article by Peter Mularien is an excerpt from the book Spring Security 3.
In this article, we will:
- Examine different methods of configuring password encoding
- Understand the password salting technique of providing additional security to stored passwords
Spring Python offers a clean cut way to take simple applications and split them out between multiple machines using remoting techniques that can be seamlessly injected without causing code rewrite headaches. Spring Python makes it easy to utilize existing technologies, while also being prepared to support ones not yet designed.
In this article by Greg Lee Turnquist, author of Spring Python 1.1, we will learn how:
- Pyro provides a nice Python-to-Python remoting capability to easily create client-server applications
- Spring Python seamlessly integrates with Python so that your application doesn't have to learn the API
- You can convert a simple application into a distributed one, all on the same machine
- It takes little effort to rewire an application by splitting it up into parts, plugging in a round-robin queue manager, and running multiple copies of the server with no impact to our business logic
In this article by Peter Mularien, author of the book Spring Security 3, we will review information relating to common migration issues when moving from Spring Security 2 to Spring Security 3.Read Migration to Spring Security 3 in full
User authentication is an important part of many applications. Let's look at how we would utilize third-party authentication methods. oAuth is an open protocol for secure user authentication across APIs. It allows users to gain limited access to websites by using their Twitter credentials. It's a very sound method of user authentication, and doesn't take too much work to get going. Twitter oAuth is used by hundreds of third-party Twitter clients and mashups—just to give you an idea of how useful it can be.
In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will:
- Learn how Twitter oAuth works
- Create a library for authentication
- Utilize the library in order to create an application to demonstrate how it works
In a previous article we covered User Authentication with Codeigniter 1.7 using Twitter oAuth. In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will continue our discussion on how we can utilize third-party authentication methods by using Facebook Connect.
Facebook Connect is just like Twitter oAuth, but for Facebook accounts. It doesn't use the oAuth protocol, so its workings might seem slightly different to developers. To users, however, the difference is marginal. Just like in Twitter oAuth, users do not need to enter any of their account credentials on your website or application—it is all handled by Facebook.Read User Authentication with Codeigniter 1.7 using Facebook Connect in full
In order to demonstrate Django's rapid development potential, we will begin by constructing a simple, but fully-featured, e-commerce store. The goal is to be up and running with a product catalog and products for sale, including a simple payment processing interface, in about half-an-hour. If this seems ambitious, remember that Django offers a lot of built-in shortcuts for the most common web-related development tasks. We will be taking full advantage of these and there will be side discussions of their general use.
In addition to building our starter storefront, this article aims to demonstrate some other Django tools and techniques. In this article by Jesse Legg, author of Django 1.2 e-commerce, we will:
- Create our Django Product model to take advantage of the automatic admin tool
- Build a flexible but easy to use categorization system, to better organize our catalog of products
- Utilize Django's generic view framework to expose a quick set of views on our catalog data
- Finally, create a simple template for selling products through the Google Checkout API
In this article by April Sims, author of the book Oracle Database 11g – Underground Advice for Database Administrators, we will learn about Oracle's RDBMS Log Miner Utility, Flash(back) Recovery Area (FRA), and Automatic Undo Management (AUM).Read Oracle: RDBMS Log Miner Utility, FRA, and AUM in full