BIRT is an open source business intelligence and reporting tool built on top of the Eclipse Framework. BIRT is used by developers for building reports that can best represent data and tell a story of that data that is easy to follow. In addition, BIRT can be integrated into a product to allow that product to provide reporting capabilities.
In this article by John Ward,author of BIRT 2.6 Data Analysis and Reporting we will learn how Themes provide a simple mechanism to apply a wide range of styles to an entire report design without the need to manually apply them.Read Creating Themes for a Report using BIRT in full
In this article by Daniel Barreiro and Dan Wellman, authors of the book YUI 2.8: Learning the Library, we see the Rich Text Editor, which allows our users to create enhanced text as one of the most popular forms of user interaction over the Internet is user-created content.Read YUI 2.8: Rich Text Editor in full
In this article series by John Ward, author of BIRT 2.6 Data Analysis and Reporting, we will be looking at a practical example of building a reporting site. In this part of the article, we will be looking at a scenario where we have a Bugzilla instance setup with a series of bugs related to BIRT. We will look at a series of requirements and build the reports necessary to fulfil those requirements.Read Creating a Reporting Site using BIRT in full
In the previous article How to Create a Reporting Site
In this article series by John Ward,author of BIRT 2.6 Data Analysis and Reporting we will be looking at :
- Bug Status- A Report to show open issues compared to all bugs
- Developer issues reports-this report will accomplish two things—shows us a Pie Chart showing fixed versus non-fixed bugs and gives us a list of bugs in an open status assigned to that developer.
In this article by Wojciech Kocjan and Piotr Beltowski, authors of the book Tcl 8.5 Network Programming, we will see how to create a secure communication system, and make sure all certificates can be generated and transferred securely to remote systems before they can be fully authenticated within the infrastructure.Read Managing Certificates from Tcl in full