In this article by Jose Argudo Blanco and David Upton, we will cover the following:
- How to pass parameters to controllers using the URL
- How to write better views and pass dynamic data to them
- How a reply is returned to the surfer
- How the files or classes pass information and control to each other
- How useful code is kept inside helper and library files
- Some practical hints on site design
This article by Vamsavardhana Reddy Chillakuru expands on the Apache Geronimo architecture. We will first see the concept of Inversion of Control (IoC) and dependency injection, which are two of the core concepts around which the current architecture is developed. We will then give a high-level overview of the internal architecture of Apache Geronimo and go through each component that makes up the architecture. Therefore, we will be covering GBeans, configurations, the kernel interface, repository, attribute store, dependencies, class loaders, deployment, plugins, and the concept of custom server assemblies. We will be covering these topics in detail so that you are able to understand the big picture. It will also help you if you want to contribute to Apache Geronimo or develop new services to run on Apache Geronimo. We will also list the different modules by their configuration IDs and map them to their functionality.
In this article, you will learn about:
- How Inversion of Control and dependency injection work
- GBeans—the building blocks of Geronimo
- Configuration—a collection of GBeans deployed together
- High-level architecture of Geronimo
- Class loader architecture
- Geronimo server directory structure
- Deployment architecture
In this article by Mark Noble, we will explore various ways of adding downloads to your web site to provide free content, or to deliver paid content to users. We will also discuss the automatic conversion of pages to PDF files, which your users can download to read or print.Read Freebies and Downloads in Drupal 6: Part1 in full
In this article series by Alistair McDonald, we will cover some important topics that discuss the use of Spam Assassin in conjunction with Procmail to filter out the wide range of spam that afflicts the modern e-mail user.
In this article, we will learn:
- How to filter incoming e-mails with SpamAssassin?
- How to configure SpamAssassin to work on per-user or per-server basis?