In this article by Ian Hlavats, we will discuss about JSF in detail. We will learn about:
- Model-View-Controller architecture
- JSF Request Processing Lifecycle
- Managed Beans
- EL Expressions
- UI Components
Read An Introduction to JSF: Part 1 in full
This is the second part of the article series on An Introduction to JSF. In this article by Ian Hlavats, we will discuss about Standard JSF Validators and Internationalization in detail. Read An Introduction to JSF: Part 1 here.Read An Introduction to JSF: Part 2 in full
This article series by Douglas Paterson, author of Building Websites with PHP-Nuke, begins with an overview of PHP-Nuke; what it is, and what it can do to help you build your own community-driven website. We shall learn all the features and functionality provided by PHP-Nuke by developing an example site, the Dinosaur Portal, as we progress through this series.
In this article series, we will cover:
- An Introduction to PHP-Nuke (see below)
- Installing PHP-Nuke
- Your First Page
- Managing the Site
- Managing Users
- Story Management with PHP-Nuke
- Content Management Modules
- Managing the Discussion Forums
- Customizing Layout with Themes
- Programming PHP-Nuke
Rhomobile has revolutionized the process of developing mobile applications. It has enabled developers to become much faster and more efficient, allowing quicker application development. It enables software programmers to build applications for mobile devices using HTML and Ruby instead of proprietary languages such as Objective-C. Currently, the Rhodes framework supports development for the iPhone, Windows Mobile, Google Android, Symbian, and BlackBerry operating systems.
In this article by Abhishek Nalwaya, author of Rhomobile Beginners Guide, we will briefly discuss the various products of Rhomobile and their architecture.Read An Introduction to Rhomobile in full
Security is a process that requires the integration of security into business processes to ensure enterprise risk is minimized to an acceptable level. Security as a process is an approach that highlights the integration of security and business initiatives to reduce the security impact of implementations and changes to the enterprise environment. This article by Aaron Woody, author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise, will introduce the concept of using risk analysis to drive security decisions.Read An Introduction to Risk Analysis in full
This article by Peter von Oven, author of VMware Horizon Mirage Essentials, explains all about what Horizon Mirage is and the terminologies used along with the three use case categories: Manage, Migrate, and Protect.Read An Introduction to VMware Horizon Mirage in full
This article is written by Sanjay Sharma, the author of Cassandra Design Patterns. When Cassandra was first being developed, the initial developers had to take a design decision on whether to build a Dynamo-like or a Google BigTable-like system, and these clever guys decided to use the best of both worlds. Hence, the Cassandra architecture is loosely based on the foundations of peer-to-peer-based Dynamo architecture, with the data storage model based on Google BigTable.Read An overview of architecture and modeling in Cassandra in full
In this article by Alexandre Alves,Robin J. Smith and Lloyd Williams, authors of Getting Started with Oracle Event Processing 11g, you will be introduced to the basic concepts of Complex Event Processing ( CEP ), its impact today on businesses across all industries, and the key artifacts that together constitute an Event-Driven Solution Platform. Some of the topics we will cover are as follows:
What is event processing
Relating this to a business in computing terms
Use case: A solution for customer problems
Key elements of event stream processing
Event processing languages and extensibility
Holistic event-driven and service-orientated architectures
Predicting an event
In this article, we will briefly review the Joomla!/VirtueMart file structure. We will then continue to explain the presentation framework of Joomla! and VirtueMart. A high-level view of the VirtueMart engine will be presented and we will see how the VirtueMart theme and template fits in the whole system. After that, we will be able to understand the various ways to customize the VirtueMart shop and provide a list of items we need to consider before heading on a customization project.
Briefly, in this article by Joseph Kwan, author of Joomla! VirtueMart 1.1 Theme and Template Design, we will cover:
- Navigating through the Joomla!/VirtueMart directories
- Structure of the Joomla! URL path
- Joomla! presentation framework
- VirtueMart presentation framework
- Roles of VirtueMart themes and templates
- Ways to customize VirtueMart
Delivering business solutions is more than just product play. Software is often viewed as the enabler; however, the key to success is how the solution is implemented and how the implementations are managed. With this as the background, Microsoft has developed Sure Step as the full lifecycle methodology for the Microsoft Dynamics solutions portfolio. In this article, we introduce the concept of Methodology and its importance in the selection and implementation of ERP/CRM solutions. A faulty selection process can derail any solution deployment, and it is important for the readers to understand what they can do to prevent this.
In this article by Chandru Shankar and Vincent Bellefroid, authors of Microsoft Dynamics Sure Step, we will introduce the concepts and definitions. We will also provide an overview of Microsoft Dynamics Sure Step, and the different aspects of the methodology that help both the implementer and the customer.Read An Overview of Microsoft Sure Step in full
In this article by Muneeb A. Siddiqui, author of Oracle EBS supply chain management R12, we will see how pricing engine works for Oracle E-Business Suite, how we can cater different scenarios of discounts and surcharges using Oracle Advanced Pricing, and how a price list for an item is created and how it effects the modules which are integrated and associated with Oracle Advanced Pricing. In this article, we will also see how qualifiers and modifiers are efficiently used to capture business scenarios as well as how to setup Oracle Advanced Pricing.Read An Overview of Oracle Advanced Pricing in full
Interactive Reporting is an extremely robust and powerful business intelligence tool providing ad-hoc querying, data analysis, dashboards, and other reporting capabilities. Business analysts access the software through the EPM Workspace, a central location for viewing and managing content across all of the Hyperion products. The product is extremely flexible and provides analysts with the ability to quickly analyze data and produce deliverables. The software provides a consistent platform for managing content, where documents can be customized, saved, and shared across an organization. The focus of this article is to provide an overview of the Interactive Reporting Web Client and EPM Workspace, providing the business analyst with the skills necessary to work with the tool on a daily basis.
The content in this article by Edward J. Cody, author of The Business Analyst's Guide to Oracle Hyperion Interactive Reporting 11, covers:
- Navigating the EPM Workspace
- Installing the Web Client
- An Overview of the Web Client interface
- Methods for opening and saving documents
- Methods for importing and provisioning files
- Steps to edit file properties
Commitment Control is an optional feature of PeopleSoft used for enforcing budget control over an organization's spending. It enables an organization to perform what is known as "encumbrance accounting", or commitment accounting. Using this feature, organizations can define budgets for various categories of their spending and track each spending transaction against available budget amounts. Although commitment control configurations are part of the General Ledger module, it spans many more modules such as Purchasing, Accounts Payable, Expenses, Billing, Accounts Receivable, and so on, which are responsible for creating transactions for spending as well as generating revenue.
In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll cover the following important topics:
- Understanding commitment control
- Commitment control configurations
NPM is a package management and distribution system for Node. It has become the de-facto standard for distributing modules (packages) for use with Node. Conceptually it's similar to tools like apt-get (Debian), rpm/yum (Redhat/Fedora), MacPorts (Mac OS X), CPAN (Perl), or PEAR (PHP). It's purpose is publishing and distributing Node packages over the Internet using a simple command-line interface. With npm you can quickly find packages to serve specific purposes, download them, install them, and manage packages you've already installed. npm defines a package format for Node largely based on the CommonJS Package spec.
In this article by David Herron, author of Node Web Development, we will take a look at the npm package management system.Read An Overview of the Node Package Manager in full
Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to become a full-featured scripted programming language capable of creating elegant, cross-platform solutions.
In this article by Bert Wheeler, author of Tcl/Tk 8.5 Programming Cookbook, we will cover the following topics:
- The Tcl shell
- Writing to the Tcl console
- Mathematical expressions
- Tcl expr operands
- Tcl expr operators
- Mathematical functions
- Computing mathematical expressions
- Referencing files in Tcl
- Launching a Tcl script
Java Enterprise Edition can be considered to be nothing more than a set of specifications, or interfaces, for which service providers are required to provide implementations. While it is the actual implementation that does all the work, these specifications ensure that each implementation can assume that all its other collaborating pieces work as described by their interfaces. In theory, this allows complex software platforms (such as application servers) to be assembled from constituent implementations, each of which is sourced from a different vendor.
This article by Damodar Chetty introduces the reader to the Tomcat container. All the components of Tomcat are described with just enough detail, so as not to overwhelm the reader with too much information.Read An Overview of Tomcat 6 Servlet Container: Part 1 in full
When Sakai was first designed, the specifics of the majority of the connected systems were not knowable. To adapt to these tough circumstances, Sakai supplies web services that are easy to hook into or write. Sakai exposes services for creating and maintaining users, sites, and groups. These services are easily extensible to include any part of the Sakai framework.
This article by Alan Berg, author of Sakai CLE Courseware Management, explains the two main types of web service, Simple Object Access Protocol (SOAP) and Representational State Transfer (REST). It also covers the already-existing web services and describes how to hook into them. If you follow the examples, you will be able to write and deploy your first service. Lastly, this article includes a few simple client-side Perl scripts that create new users, employing both the SOAP and RESTful approaches.Read An Overview of Web Services in Sakai in full
This article by Srinath Perera the author of Instant MapReduce Patterns – Hadoop Essentials How-to, will explain how to use MapReduce to calculate frequency distribution of the number of items brought by each customer. Then we will use gnuplot, a free and powerful, plotting program to plot results from the Hadoop job.Read Analytics – Drawing a Frequency Distribution with MapReduce (Intermediate) in full