Security design is a critical part—of any implementation of PeopleSoft Financial application. By its very nature, a financial system needs robust security mechanisms to enforce appropriate controls on who can access the system and which features. PeopleSoft security consists of multiple aspects, such as User security, Row level security, Query security, Network security, Database security, Object security, and Field level security. We'll concentrate on security aspects that are typically configured by a Business Analyst or a Functional SME, that is, User-and Row-level security. Remaining aspects of security involve significant technical knowledge of PeopleSoft's application development environment (known as Application Designer) and security technologies, such as SSL.
In this article by Ranjeet Yadav, author of Oracle PeopleSoft Enterprise Financial Management 9.1 Implementation, we'll discuss user security components such as User Profiles, Roles, and Permission Lists. We'll also discuss how to enable and configure Row level security.Read Designing User Security for Oracle PeopleSoft Applications in full
In this article by Bob Griesemer, we will learn about designing the target structure in Oracle Warehouse Builder. We will discuss about data warehouse design, implementation of dimensional model in a database, designing the ACME data warehouse, and also OWB design objects.Read Designing the Target Structure in Oracle Warehouse Builder 11g in full
One of the most dominant Internet services today is the social networking service. A social networking service is an Internet service that models social relationships among people. Essentially it consists of a user profile, his or her social links, and a variety of additional services. Most social networking services are web-based and provide various ways for users to interact over the Internet, including sharing content and communications. Facebook is the most dominant social networking service till date, with 400 million active users, 5 billion pieces of content shared each week, and more than 100 million active users concurrently accessing Facebook through their mobile devices. It is also the most widespread, with 70 percent of its users from outside of US, its home market.
According to a report by the Nielsen Company, in January 2010, the amount of time an average person spent on Facebook is more than seven hours per month, which amounts to more than 14 minutes per day. If you lump together the time spent on Google, Yahoo!, YouTube, Bing, Wikipedia, and Amazon, it still doesn't beat Facebook!
In this article by Chang Sau Sheong, author of the book Cloning Internet Applications with Ruby, we will be cloning Facebook and creating an application called Colony, which has the basic but essential features of Facebook.Read Designing the Facebook Clone and Creating Colony using Ruby in full
Designing a web page layout is one of many steps in making a website. How involved you are in each part of this process depends on whether you are creating a website for yourself or a client (you do it all) or for a company in which you work. In this article, we'll take the stance of a web designer who is a part of a team of people that will help creating the web site. We focus primarily on the design and graphical elements of a web page and assume that other members of the team are working on the back-end tasks.
In this article by Bethany Hiitola, author of Inkscape 0.48 Essentials for Web Designers, we will focus on:
- How to create the overall front or main page design of a web site
- Defining some basic design elements
- Options for using grids and guidelines for alignment
- Common screen sizes
In this article series by Masoud Kalali, author of GlassFish Security, we are going to develop a secure Java EE application with all standard modules including Web, EJB, and application client modules.Read Designing Secure Java EE Applications in GlassFish in full
This article by Mahmoud Elkoush, author of Reporting with Visual Studio and Crystal Reports, describes how to use Microsoft Visual Studio 2012. We will create our application, and by studying the working of this application, we will learn the features of Visual Studio. We will also design our interface and validate our data. By the end of this article, we will have the final design of our application.
In this article, we will cover the following topics:
- Creating a new application
- Adding controls to the form
- Validating form data
- Sketching our reports on paper
In this article, by Rakesh Raul, the author of Microsoft Dynamics NAV 7 Programming Cookbook, we will cover the following recipes:
- Updating the subform page from a parent page
- Creating a FactBox page
- Creating a Queue page
- Creating a Role Center page
- Creating a wizard page
In this article by Gordon Fisher, the author of Blender 3D Printing Essentials, we will learn about a 3D printer and how it works. We will also see the types of a 3D printers and how they are controlled.Read Designing Objects for 3D Printing in full
Ruby on Rails is a recent entrant in the world of web application framework. Ruby is the language used and Ruby on Rails is the framework built upon Ruby. In this article by A.P. Rajshekhar, we will be designing and creating database tables for a User Management Module (UMM). The UMM is responsible for Registering users, Modifying user information, Assigning roles or privileges, Viewing the user, and Deleting the user. Let us go forward and look at the background information required for designing and creating the database tables used for this module.Read Designing and Creating Database Tables in Ruby on Rails in full
In this article, by Makzan, author of Flash Multiplayer Virtual Worlds, we will discuss several important techniques for designing avatars in virtual world.
We will specifically cover:
- Determining the direction numbers of avatars' views
- Rendering avatars in Flash virtual world
- Drawing an avatar in Flash
- Creating an avatar class
- Logging in SmartFoxServer with avatar
- Using user variables in virtual world
- Adding name to the avatar
XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure applications quickly to thousands of users.
The most important step before any Citrix deployment is to understand the features of the product and design the architecture before the servers are set up.
In this article by Guillermo Musumeci, author of Getting Started with Citrix XenApp 6, we will cover the following topics:
- Learning Citrix farm terminology and concepts
- Designing a basic XenApp architecture
- Designing a basic pilot plan
- Creating a list of applications to publish in our Citrix farm
- Reviewing a list of applications and deciding the best method to deliver them
In this article by Massimiliano Dessi, we're going to examine some important design decisions to build better applications. In these design decisions, the AOP plays a significant role because it provides smart solutions to common crosscutting problems.
We will look at the following AOP design solutions:
- Concurrency with AOP
- Transparent caching with AOP
- Security with AOP
This article written by Ágnes Vidovics-Dancs and Gergely Daróczi, the authors of Introduction to R for Quantitative Finance, explains the pricing of derivatives using discrete and continuous time models. Furthermore, you will learn how to calculate derivatives' risk measures and the so-called "Greeks".Read Derivatives Pricing in full
Deployment answers the need to have the generated reports reach the relevant user.In this article by John Ward, we are going to look at two different Deployment options available. We will look at the BIRT Viewer for J2EE that comes with the BIRT Runtime and is embedded into the BIRT Eclipse IDE, and we are also going to look at a basic Java application that implements the Report Engine API to run reports. We will also cover the command-line tools that come with the BIRT Runtime for executing reports.Read Deployment of Reports with BIRT in full
Once your portal is looking the way you want it to, it is time to share your creation with the rest of the world. We want to transfer our site from our local computer and set it up on the World Wide Web.
In this article by Daniel N. Egan, you will know the following:
- How to obtain a domain name for your site
- What to look for in a hosting provider
- How to modify your files to prepare for moving to a host
- How to set up your database on a hosted site
- What file permissions are needed for your site to run
After installing an application server, we would want to deploy applications. Applications can be installed manually or in an automated fashion using scripts. In this two-part article by Steven Charles Robinson, we will cover how to manually deploy a J2EE (Enterprise Edition) application. As we walk through this article, we will show you how to deploy two applications. One application does not require database connectivity; the second is a database aware application which requires some WebSphere configuration to provide database connectivity to the application.
In this article, we will cover the following topics:
- Application server internals
- The web container
- Virtual hosts
- WebSphere ports
- Data sources
- Java Naming and Directory Interface (JNDI)
- Application deployment
- J2EE applications
- Enterprise Archive (EAR)
- Web Archive (WAR)
- Java Archive (JAR)
The concept of running HTML5 applications is like running the application in a stripped-down web browser as a wrapper. The UI wrapper for our HTML5 application will be written in Vala, using the GTK+ flavor of the famous WebKit layout engine, which is called WebKitGTK+.
In this article, by Mohammad Anwari author of GNOME 3 Application Development Beginner's Guide, we will not only learn how to run our HTML5 applications inside a UI wrapper,but will also learn to use GNOME platform as the middleware. Specifically, our topics for this article are as follows:
Embedding WebKit inside our GTK+ application