Article Network

Hands-on Tutorial for Getting Started with Amazon SimpleDB

by Prabhakar Chaganti Rich Helms | May 2010 | Enterprise Articles Java PHP Web Development

With Amazon SimpleDB you can scale your application's database on the cloud. In this article by Prabhakar Chaganti and Rich Helms, authors of Amazon SimpleDB Developer Guide, we going to sign up for an AWS account, download and install the necessary libraries, and create little code snippets for exploring SimpleDB. We will introduce the libraries as well as the SimpleDB Firefox plugin for manipulating SimpleDB. We will also examine the two methods for accessing SimpleDB: SOAP and ReST. For PHP users we will introduce the PHP sample library. You can install the samples on your PHP5 server so that you can try the samples as you read about them.

In this article we will:

  • Set up an AWS account
  • Enable SimpleDB service for the account
  • Install and set up libraries for Java, PHP, and Python
  • Illustrate several SimpleDB operations using these libraries
Read Hands-on Tutorial for Getting Started with Amazon SimpleDB in full

Opening up to OpenID with Spring Security

by Peter Mularien | May 2010 | Java Open Source Web Development

OpenID is a very popular form of trusted identity management that allows users to manage their identity through a single trusted provider. This convenient feature provides users with the security of storing their password and personal information with the trusted OpenID provider, optionally disclosing this personal information upon request. Additionally, the OpenID-enabled website can have confidence that the users providing OpenID credentials is who they say they are.

In this article by Peter Mularien, author of the book Spring Security 3, we will:

  • Learn to set up our own OpenID in less than five minutes
  • Configure the JBCP Pets website with a very rapid implementation of OpenID
  • Learn the conceptual architecture of OpenID and how it provides your site with trustworthy user access
  • Implement OpenID-based user registration
  • Experiment with OpenID attribute exchange for user profile functionality
Read Opening up to OpenID with Spring Security in full

Installing and Configuring Joomla! on Local and Remote Servers

by Timi Ogunjobi | May 2010 | Joomla! Content Management PHP Web Development

This article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, covers basic details about installing and configuring Joomla! for use on both local and remote servers. This article also contains information about where to obtain essential resources for learning, using, and optimizing Joomla!

Read Installing and Configuring Joomla! on Local and Remote Servers in full

Moodle 1.9: Exploring Design Portfolios

by Paul Taylor | May 2010 | e-Learning Moodle Open Source

There are a number of electronic portfolios (e-portfolios) available to work with Moodle and they range in complexity and functionality. As they are a very personal thing, this article will try to give an overview of the most popular portfolios and a review of their main features in terms of supplementing Design Technology courses, as well as some examples of how they might be used to best effect.

In this article by Paul Taylor, author of the book Moodle 1.9 for Design and Technology, we will look at three popular portfolio applications:

  • Exabis:It is a small file manager-based portfolio that enables a degree of sharing and integrates as a block into Moodle courses
  • MyStuff: It is a fully featured internal portfolio designed and maintained by the Open University, offering more sharing and collaborative tools
  • Mahara: It is an external portfolio that integrates with Moodle using Single Sign On (SSO)
  • Read Moodle 1.9: Exploring Design Portfolios in full

    Creating, Installing and Tweaking your theme using Plone 3

    by Veda Williams | May 2010 | Open Source

    Themes are among the most powerful features that can be used to customize a web site, especially in Plone. Using custom themes can help you brand your site for a particular corporate image; it ensures standards compliance and creates easily navigable layouts. But most Plone users still continue to use default themes as developing and deploying themes that are flexible and easily maintainable is not always straightforward.

    In the article by Veda Williams, author of Plone 3 Theming, we will learn :

    • About the theme
    • Creating a theme product
    • Altering the theme product's structure
    • Installing the theme product
    • Adjusting web site content to support the design
    Read Creating, Installing and Tweaking your theme using Plone 3 in full

    Plone 3 Themes

    by Erik Rose | May 2010 | Content Management Open Source

    This article by Erik Rose, author of the book Plone 3 for Education, is a crash course in Plone 3 theme creation. After untangling Plone's confusing theming situation, we walk you through the development of a skeletal theme.

    Read Plone 3 Themes in full

    Building a News Aggregating Site in Joomla!

    by Timi Ogunjobi | May 2010 | Joomla! Content Management Open Source PHP Web Development

    Bad news is always good news for the press. This is why Vaughan Pyre has decided to take advantage of this fact and creates a website that will aggregate bad news and weird happenings from all over the world. In this article by Timi Ogunjobi, author of Joomla! 1.5 Site Blueprints, the content of the site will be entirely derived from Really Simple Syndication (RSS) feeds from several sources (each feed being automatically fetched and its items displayed on the website).

    Weird Hap'nins requirements will be the need to:

    • Get external feed sources and allocate them to menu links on the website
    • Create the means to automatically fetch and display article items located in the feeds
    • Display the latest content from all feed sources on the front page
    Read Building a News Aggregating Site in Joomla! in full

    Use of macros in IBM Cognos 8 Report Studio

    by Abhishek Sanghani | May 2010 | Enterprise Articles IBM

    Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences, report authors will need guidance.

    In this article, by Abhishek Sanghani, author of IBM Cognos 8 Report Studio Cookbook, we will show you  that even though macros are often considered a Framework Modeler's tool, they can be used within Report Studio as well. These recipes will show you some very useful macros around security, string manipulation, and prompting.

    Read Use of macros in IBM Cognos 8 Report Studio in full

    Easily Writing SQL Queries with Spring Python

    by Greg L. Turnquist | May 2010 | Open Source

    Spring Python takes the concepts of the Spring Framework and Spring Security, and brings them to the world of Python. It isn't a simple line-by-line port of the code. Instead, it takes some powerful ideas that were discovered in the realm of Java, and pragmatically applies them in the world of Python.

    Spring (Java) provides many simple, easy-to-use functional parts to assemble applications instead of a monolithic framework to extend. Spring Python uses this same approach. This means we can use as little or as much Spring Python as we need to get the job done for each Python application.

    In this article by Greg Lee Turnquist, Author of Spring Python 1.1, we will show you how to rapidly write pure SQL queries without dealing with mind-numbing boilerplate code. It also shows how Spring Python works nicely with ORM-based persistence.

    Read Easily Writing SQL Queries with Spring Python in full

    Spring Security: Configuring Secure Passwords

    by Peter Mularien | May 2010 | Java Open Source Web Development

    This article by Peter Mularien is an excerpt from the book Spring Security 3.

    In this article, we will:

    • Examine different methods of configuring password encoding
    • Understand the password salting technique of providing additional security to stored passwords
    Read Spring Security: Configuring Secure Passwords in full

    Scaling your Application Across Nodes with Spring Python's Remoting

    by Greg L. Turnquist | May 2010 | Open Source Web Development

    Spring Python offers a clean cut way to take simple applications and split them out between multiple machines using remoting techniques that can be seamlessly injected without causing code rewrite headaches. Spring Python makes it easy to utilize existing technologies, while also being prepared to support ones not yet designed.

    In this article by Greg Lee Turnquist, author of Spring Python 1.1, we will learn how:

    • Pyro provides a nice Python-to-Python remoting capability to easily create client-server applications
    • Spring Python seamlessly integrates with Python so that your application doesn't have to learn the API
    • You can convert a simple application into a distributed one, all on the same machine
    • It takes little effort to rewire an application by splitting it up into parts, plugging in a round-robin queue manager, and running multiple copies of the server with no impact to our business logic
    Read Scaling your Application Across Nodes with Spring Python's Remoting in full

    Migration to Spring Security 3

    by Peter Mularien | May 2010 | Java Open Source Web Development

    In this article by Peter Mularien, author of the book Spring Security 3, we will review information relating to common migration issues when moving from Spring Security 2 to Spring Security 3.

    Read Migration to Spring Security 3 in full

    User Authentication with Codeigniter 1.7 using Twitter oAuth

    by Adam Griffiths | May 2010 | Open Source PHP Web Development

    User authentication is an important part of many applications. Let's look at how we would utilize third-party authentication methods. oAuth is an open protocol for secure user authentication across APIs. It allows users to gain limited access to websites by using their Twitter credentials. It's a very sound method of user authentication, and doesn't take too much work to get going. Twitter oAuth is used by hundreds of third-party Twitter clients and mashups—just to give you an idea of how useful it can be.

    In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will:

    • Learn how Twitter oAuth works
    • Create a library for authentication
    • Utilize the library in order to create an application to demonstrate how it works
    Read User Authentication with Codeigniter 1.7 using Twitter oAuth in full

    User Authentication with Codeigniter 1.7 using Facebook Connect

    by Adam Griffiths | May 2010 | Open Source PHP Web Development

    In a previous article we covered User Authentication with Codeigniter 1.7 using Twitter oAuth. In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will continue our discussion on how we can utilize third-party authentication methods by using Facebook Connect.

    Facebook Connect is just like Twitter oAuth, but for Facebook accounts. It doesn't use the oAuth protocol, so its workings might seem slightly different to developers. To users, however, the difference is marginal. Just like in Twitter oAuth, users do not need to enter any of their account credentials on your website or application—it is all handled by Facebook.

    Read User Authentication with Codeigniter 1.7 using Facebook Connect in full

    Setting up a Complete Django E-commerce store in 30 minutes

    by Jesse Legg | May 2010 | e-Commerce Open Source

    In order to demonstrate Django's rapid development potential, we will begin by constructing a simple, but fully-featured, e-commerce store. The goal is to be up and running with a product catalog and products for sale, including a simple payment processing interface, in about half-an-hour. If this seems ambitious, remember that Django offers a lot of built-in shortcuts for the most common web-related development tasks. We will be taking full advantage of these and there will be side discussions of their general use.

    In addition to building our starter storefront, this article aims to demonstrate some other Django tools and techniques. In this article by Jesse Legg, author of Django 1.2 e-commerce, we will:

    • Create our Django Product model to take advantage of the automatic admin tool
    • Build a flexible but easy to use categorization system, to better organize our catalog of products
    • Utilize Django's generic view framework to expose a quick set of views on our catalog data
    • Finally, create a simple template for selling products through the Google Checkout API
    Read Setting up a Complete Django E-commerce store in 30 minutes in full
    Code Download and Errata
    Packt Anytime, Anywhere
    Register Books
    Print Upgrades
    eBook Downloads
    Video Support
    Contact Us
    Awards Voting Nominations Previous Winners
    Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
    Resources
    Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software