This two-part article by James Kennard shows how we can modify the server response by working with the global document object.
It contains the following recipes:
- Setting the document title
- Setting the document generator
- Setting the document description
- Adding metadata to the document
- Changing the document character set
- Changing the document MIME type
- Controlling client caching of responses
In a service-oriented world, a level of abstraction is needed for creation and use of events using business semantics, without the publisher or subscriber of the event ever having to worry about the mechanics of messaging. Oracle SOA Suite 11g addresses this with the introduction of a new feature in the form of the Event Delivery Network.
In this article by Heidi Buelow, Manas Deb, Jayaram Kasi, Demed L'Her and Prasen Palvankar, we will work with events using the unified services and events platform of Oracle SOA Suite 11g to provide an event-handling solution.Read Event Delivery Network with Oracle SOA Suite 11g R1 in full
In the previous part of the article by Barrie Dempster, David Gomillion, and David Merel we saw how to create a context, extension, and outgoing extensions. In this part we will learn about Advanced Call Distribution, Automated attendants, and System services.Read Creating a Dialplan in Asterisk 1.6: Part 2 in full
This article applies primarily to a client/server environment where all the content objects are stored on a central server.
In this two-part article by Dirk Manuel, you will learn how to:
- Check in/out a content object
- Display and Revert to an earlier version history of an object
- Restore a deleted content object
- Export content/Import content-backup file
- Import content from a previous version of UPK or OnDemand
In this two part article series by Gastón C. Hillar, we will use advanced physics and add special effects to the scenes. We will learn to generate gravity effects, add fluids with movements, and use transitions to determine different states in a game.
By reading this article and following the exercises we will learn to:
- Add many background models, adding life to the game
- Control many independent backgrounds
- Simulate fluids with movement
- Work with multiple concurrent physics simulators
- Use advanced physics simulation to create waves
In this two-part article by Barrie Dempster, David Gomillion, and David Merel we will learn how to create your dialplan that determines how your calls are routed through the Asterisk server. We will also cover how to create extensions, distribute calls in an orderly manner using queues, and present callers with a greeting using automated attendants (IVR). In this part we will learn to create a context, extension, and outgoing extensions.Read Creating a Dialplan in Asterisk 1.6: Part 1 in full
After developing an application in Symfony 1.3, the next aspect we will cover is creation of forms. Symfony incorporates a subframework that handles forms, which once mastered, makes creating forms an enjoyable task. In this two-part article by Tim Bowler, we are going to see how easy it is to create and validate forms by creating a newsletter signup module for our web site. We will then convert our new module into a plugin so that we can use it with other projects.
By the end of this article you will know how to:
- Add a third-party library to send automated emails
- Create and modify Propel-based forms
- Use flash variables
- Create a plugin and package it up for redistribution
Quality Assurance tells us everything regarding monitoring calls, recording calls, and capturing detailed call logs. In this article by Barrie Dempster, David Gomillion, and David Merel you learn how to install and use these features in Asterisk 1.6.Read Quality Assurance in Asterisk 1.6 in full
This article demonstrates how we can secure extensions and explains some of the ramifications if we fail to do this.
This two-part article by James Kennard contains the following recipes:
- Writing SQL safe queries
- Writing SQL-safe LIKE string comparison queries
- Using the token
- Making a filename safe
- Making a directory path safe
- Making a path safe
- Safely retrieving request data
- Getting a value from an array