In this article, by Jonas X. Yuan, Xinsheng Chen & Frank Yu, authors of Liferay User Interface Development, we will cover:
- How to add workflow capabilities on custom assets in plugins
- Custom attributes in plugins
In the previous article by George Papadongonas and Yiannis Doxaras, authors of Drupal E-commerce with Ubercart 2.x, we saw how to implement more complex marketing technique such as cross-selling using taxonomy and recommendation systems for Drupal with Ubercart, how to create an alternative layout for products using panels and enhance user interface using views. In this article we show we will you how to offer a better browsing experience to your visitors, and how to use enhanced marketing techniques to attract more clients and to make them spend more money in your store. In this article we are going to show you:
- How to improve the shopping cart
- How to manage product prices and discounts in a better way
This is the second part of the article series on User Interface Design in ICEfaces 1.8. This article will cover facelets templating and templating in ICEfusion. Read User Interface Design in ICEfaces 1.8: Part 1 here.Read User Interface Design in ICEfaces 1.8: Part 2 in full
In this article by Rainer Eschen, we will take a look at what a desktop-like presentation means to modern web applications. We will learn the design principles and start with a common page layout based on the Facelets templating.Read User Interface Design in ICEfaces 1.8: Part 1 in full
After developing an application in Symfony 1.3, the next aspect we will cover is creation of forms. Symfony incorporates a subframework that handles forms, which once mastered, makes creating forms an enjoyable task. In this two-part article by Tim Bowler, we are going to see how easy it is to create and validate forms by creating a newsletter signup module for our web site. We will then convert our new module into a plugin so that we can use it with other projects.
By the end of this article you will know how to:
- Add a third-party library to send automated emails
- Create and modify Propel-based forms
- Use flash variables
- Create a plugin and package it up for redistribution
One of the benefits of having a web application is that it can be very easily accessed by everyone around the world. One of the downsides of this is that when so many people use your application, they are going to have errors in their input. Some people are not attentive, others are tired and, finally, everyone in this world has his or her individual style of thinking, so something that seems obvious to the developers of the application might puzzle someone else.
A well-designed web application should immediately be able to define that the input is wrong and stop—otherwise all kinds of errors can happen inside of the application. If this application is user-friendly, it should:
- Clearly and unambiguously inform the user that some part of the input is erroneous, and should be corrected.
- Identify the field that is erroneous and mark it in some way.
- If possible, display the erroneous value, and maybe even explain why exactly it is wrong.
In this article by Alexander Kolesnikov, we will see how Tapestry 5, being a highly efficient and user-friendly framework, handles these issues. For the purpose of this article we will use a Tapestry web application named Celebrity Collector.Read User Input Validation in Tapestry 5 in full
In this article, by David Burns, author of Selenium 1.0 Testing Tools, we are going to look at how we can expand Selenium. This is for those times when Selenium's API is not verbose enough.
Selenium has the ability to allow developers to create functions, in the same three-column format, to all tests to reuse snippets of code instead of evaluating them with getEval calls.
In this article, we shall discuss:
- User extensions
So let's get on with it...Read User Extensions and Add-ons in Selenium 1.0 Testing Tools in full
User authentication is an important part of many applications. Let's look at how we would utilize third-party authentication methods. oAuth is an open protocol for secure user authentication across APIs. It allows users to gain limited access to websites by using their Twitter credentials. It's a very sound method of user authentication, and doesn't take too much work to get going. Twitter oAuth is used by hundreds of third-party Twitter clients and mashups—just to give you an idea of how useful it can be.
In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will:
- Learn how Twitter oAuth works
- Create a library for authentication
- Utilize the library in order to create an application to demonstrate how it works
In a previous article we covered User Authentication with Codeigniter 1.7 using Twitter oAuth. In this article by Adam Griffiths, author of CodeIgniter 1.7 Professional Development, we will continue our discussion on how we can utilize third-party authentication methods by using Facebook Connect.
Facebook Connect is just like Twitter oAuth, but for Facebook accounts. It doesn't use the oAuth protocol, so its workings might seem slightly different to developers. To users, however, the difference is marginal. Just like in Twitter oAuth, users do not need to enter any of their account credentials on your website or application—it is all handled by Facebook.Read User Authentication with Codeigniter 1.7 using Facebook Connect in full
In this article by Tarry Singh, we will explore how to manage users and groups in Oracle VM Manager 2.1.2. We will start off by dividing the section into two parts namely, managing users and managing groups. In user management, we will learn how to create a user, view or edit a user, change a user's role and delete a user. In group management, we will learn to create a group, add users to a group, edit a group and finally delete a group.Read User and Group Management: Oracle VM Manager 2.1.2 in full
In this article by David Mercer, we will look at an entirely different aspect of running a Drupal website. Once we have added the functionality to the site, we now have to give some thoughts about how this functionality is to be accessed, or by whom. As the site grows, you will most likely feel the need to delegate certain responsibilities to various people. Alternatively, you might organize a team of people to work on specific aspects of the site. Whatever is required, at some stage you will have to make decisions about who can do what, and Drupal makes sure that it is possible to do precisely this.
Having Drupal simplify the implementation of your access control policies does not mean that the task is a trivial one. There is still much thought that needs to go on behind the scenes in order to create a sophisticated, and above all, effective policy for controlling access to the site. Because of this, we will spend a bit of time exploring the ramifications of the various choices available, instead of simply listing them. Taking a holistic approach to implementing an access control policy will ensure you don't end up with any nasty surprises down the line.
Specifically, this article will look at Planning an access policy, Roles, Users, and Access rules.Read User Access Control in Drupal 6 in full
In this article by Brett Porter and Maria Odea Ching, we will take a closer look at some of the plugins from two locations: those hosted as part of the Apache Maven project (http://maven.apache.org/plugins/), and a number of plugins from the Codehaus Mojo project (http://mojo.codehaus.org/plugins.html), which is oriented directly towards Maven plugin development.
Where possible, we will apply the plugins to our example application to see how they can be used in practice, and then cover some of the other use cases and best practices for their use.Read Useful Maven Plugins: Part 1 in full
BIRT is an open source business intelligence and reporting tool, built on top of the Eclipse Framework. BIRT is used by developers for building reports that can best represent data and tell a story of that data that is easy to follow. In addition, BIRT can be integrated into a product, to allow that product to provide reporting capabilities.
In this article by John Ward,author of BIRT 2.6 Data Analysis and Reporting we will look at templates. Templates are existing report layouts that can be used as a starting point for new reports. This is useful if we use a similar layout in all our reports; we can then create a template and build from that for each new report.Read Use of Templates in Report using BIRT in full
BIRT is an open source business intelligence and reporting tool built on top of the Eclipse Framework. BIRT is used by developers for building reports that can best represent data and tell a story of that data that is easy to follow. In addition, BIRT can be integrated into a product to allow that product to provide reporting capabilities.
In this article by John Ward,author of BIRT 2.6 Data Analysis and Reporting we will look at how BIRT uses stylesheets in report designs and how styles can be grouped in a library to create themes. This will allow us to have certain sets of styles ready for use any time we develop a report so that we, as a report developer, can focus strictly on the technical aspects of the report while maintaining a consistent visual presentation.Read Use of Stylesheets for Report Designing using BIRT in full
Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences, report authors will need guidance.
In this article, by Abhishek Sanghani, author of IBM Cognos 8 Report Studio Cookbook, we will show you that even though macros are often considered a Framework Modeler's tool, they can be used within Report Studio as well. These recipes will show you some very useful macros around security, string manipulation, and prompting.Read Use of macros in IBM Cognos 8 Report Studio in full
In this article by Kevin L. Sapp, the author of the book, Instant VMware Player for Virtualization, we will cover the process of installing Windows 8 from an ISO formatted image using VMware Player.Read Use Of ISO Image for Installation of Windows8 Virtual Machine in full
This article by Chang Sau Sheong, author of the book Cloning Internet Applications with Ruby, explains about the popular Internet application, TinyURL. It describes how to create a TinyURL clone, its basic principles, and algorithms used.Read URL Shorteners – Designing the TinyURL Clone with Ruby in full
This article by Alfonso Romero, teaches you how to insert video files in your posts.The article tells you how to offer your spectators the easiest, quickest, and most attractive way to see what you have to offer.Read Uploading Videos and Sound Files on Your Posts Using Apache Roller 4.0 in full