The primary focus of The Elements of the Spring Web Flow Configuration File is to give you an in-depth look into the Spring Web Flow configuration file and its elements. In this article by Sven Lüppken, we will see which elements and their attributes are allowed in the Spring Web Flow configuration file. This article makes it easier to understand how the XML Schema definition file works, in case you have to take a look at the file of Spring Web Flow while you're configuring your flow.Read The Elements of the Spring Web Flow Configuration File in full
Ever since Microsoft started working on the ASP.NET MVC framework, one of the primary concerns was the framework's ability to re-use as many features as possible from ASP.NET Webforms. In this article by Maarten Balliauw, we will see how we can mix ASP.NET Webforms and ASP.NET MVC in one application and how data is shared between both these technologies.Read Mixing ASP.NET Webforms and ASP.NET MVC in full
Even though a trixbox system is a phone system, it is still a basic computer system like any other. One of the problems that we face is that extensions and VoIP service providers typically come into the system over the open Internet; this means that certain aspects of our system are wide open to the outside world. During the week that this article was written, several new scripts came out that allowed people to scan machines over the Internet, find systems that are running Asterisk, get the list of available extensions, and then hack the passwords. These tools allow a malicious hacker to get into your system and start making long-distance phone calls. There were numerous instances of companies with phone bills reaching into the thousands and even tens of thousands of dollars. Because of issues like this, it is more imperative than ever that you understand how to properly secure your trixbox server from the outside world. In this article by Kerry Garrison, we will focus on how to secure the trixbox server.Read Securing Your trixbox Server in full
Primarily, the Microsoft Office Outlook serves as an email application for a wide range of users. In the previous part of the article, we took an Overview of the Outlook object model and its features in VSTO. We saw the extensibility of Microsoft Office Outlook 2007 using the object model. We also learned to customize Microsoft Office Outlook menus and toolbars using VSTO. In the last part, we worked with form regions in Outlook, how to manipulate folders, contact information, and mail items using VSTO programming.
In this article by Vivek Thangaswamy, we will take a look at the following topics:
- Learning the concepts and seeing a demonstration of working with Outlook meetings and appointments
- Working with Ribbons for Outlook 2007
- Outlook applications and the Microsoft SQL Server 2008 database interaction
In this article by Michael Peacock, we will focus on creating a better selling experience for the customers of a store using a Drupal e-commerce website called 'Doug's Dinos!'.
In this article, we will learn:
- How to add a shopping cart
- How to add search features
- How to auto-create user accounts
- How to include images on our product listings
- How to provide discounts to customers based on their role
- How to enable coupons so customers can get discounts