Latest Articles

View : All | June | May | April | Alphabetical:A-Z | Z-A

Developing a Simple Workflow within SugarCRM

by Dr Mark Alexander Bain | June 2008 | CRM MySQL Open Source PHP

Workflow is about getting the right work to the right people at the right time, repeatedly—and knowing you have done so. Workflow is human-centric. First and foremost, workflow is a human activity that is made by and for those who use it: workflow is something that can easily be handled and understood by human beings.
UK Enterprise Workflow National e-Government Project—Workflow from a Business Perspective

Well, that sounds good, but the problems start to occur when you ask people to consider workflow in their organization, and there are usually a few main issues to deal with:

  • You'll find that people are normally experts in their own fields—there are often very few people who have an overview of the whole process that you're trying to map.
  • Sections of a large organization will often have different ways of carrying out the same overall process.
  • People don't really like to be told how to do their jobs—they especially don't like to have any extra processes imposed on them for now obvious reason—well, would you?
  • Talk of 'improved utilization of resources', 'improved performance monitoring', and such like can soon alienate the staff who are going to be using the system. They'll soon start using terms such as 'Big Brother'.

How you are able to deal with these will depend on your organization and the people that are available to you. At least once you've read this article by Dr. Mark Alexander Bain, you'll know that, once you've overcome those problems, the workflow itself will be easy.

Read Developing a Simple Workflow within SugarCRM in full

Troubleshooting Lotus Notes/Domino 7 applications

by Dick McCarrick,Stephen Cooke,Timothy Speed,Raphael Savir | June 2008 | Architecture & Analysis Web Development

Troubleshooting the problems are always a part of any system. In this article by Dick McCarrick, Stephen Cooke, Timothy Speed, and Raphael Savir, we will see how to identify and correct problems in our Lotus Notes/Domino 7 applications. This article includes troubleshooting issues that affect performance and also talks about Domino Domain Monitoring (DDM) and what it can do in terms of troubleshooting applications. A brief overview of Agent Profiler is given at the end of this article.

Read Troubleshooting Lotus Notes/Domino 7 applications in full

Modeling Furniture in Blender

by Allan Brito | June 2008 | Open Source Web Graphics & Video

As furniture is a key element, every item of furniture that we add to the scene increases the level of detail, and the sense of realism. We can classify furniture into two : internal and external furniture. With the first type, we have all the objects that populate our interior scenes such as sofas, beds, and chairs. The second type refers to items of urban furniture such as cars, fountains, and fences. This kind of modeling deals with smaller scales, and because of this, sometimes, we have to work at a more detailed level than we are used to. This can cause the modeling process to take a bit longer than usual, but only if we need to create a good level of detail for our models. In this type of modeling, we will use the concept of level of detail again. Another interesting thing about furniture is that we can keep the models that we create to build a good library. In this article by Allan Brito,we will learn how to add previously created furniture into new projects, decreasing the time needed to fill up the scene with furniture, with a good 3D models library. We even can download or buy models on the Internet. The only thing that we will have to do in this case is import the model into our scene.

Read Modeling Furniture in Blender in full

Development with Pluggable Authentication Modules (PAM)

by Kenneth Geisshirt | June 2008 | Linux Servers Networking & Telephony

The primary focus of Pluggable Authentication Module (PAM) is to authenticate your users. PAM lets you set up the environment that the users will work in. And when the users log out, PAM tears down the working environment in a controlled way. PAM and PAM-aware applications reduce the complexity of authentication. Application programmers can take advantage of PAM, rather than developing a complete set of authentication functions. In this article by Kenneth Geisshirt, we will see how an application uses PAM for authentication and how to develop our own PAM modules.

Read Development with Pluggable Authentication Modules (PAM) in full

ColdFusion 8-Enhancements You May Have Missed

by Charlie Griefer | June 2008 | AJAX Web Development

ColdFusion 8 is arguably one of the most significant releases of the product since ColdFusion MX (6.0) first graced our servers in 2002. The release brings with it long awaited image manipulation tags and functions. Built-in AJAX integration makes it easier to create "Web 2.0" applications. Compared to previous releases, it's also wicked fast. Given the significance of these new features, it may be easy to overlook some of the enhancements that have found their way into ColdFusion 8. In this article by Charlie Griefer, we will look into the some of the enhancements to existing features and functionality that you may have missed.

Read ColdFusion 8-Enhancements You May Have Missed in full
Code Download and Errata
Packt Anytime, Anywhere
Register Books
Print Upgrades
eBook Downloads
Video Support
Contact Us
Awards Voting Nominations Previous Winners
Judges Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software
Resources
Open Source CMS Hall Of Fame CMS Most Promising Open Source Project Open Source E-Commerce Applications Open Source JavaScript Library Open Source Graphics Software