Recent Posts

    Authors

    Published

    Tag Cloud

    301 302 404 accessibility accounts ACLs advertising aggregation Agile Analytics android APP Article attachments awards backup BCM beta browser business continuity Calendar case-study categories Chrome citigroup cms codes coding standards Complaints contact management software control panel crm CSS customer management software customer relationship system customize database DataModel DDoS demo design designer device compatibility difference distribute a published article via email DND DNS documents drag & drop Editor email EOL erp event Excel featured feeds file manager file sharing file volume Firefox Firewall HA hack Handlebar how-to HTML HTML5 HTTP HTTPS iCal IE Instructions intranet iOS iPad Java JavaScript JDBC JDK Jenkins Job Track Journal JSON JVM landing-page launcher layered database layout logging login mac marketing menu meta Microsoft Outlook mobile module modules mustache navigation NTLM offline page painter password passwords PCI policy poll pricing privacy PROXY publish publisher publsher PWA redirect Redundancy release release-notes Report Tool Reports Responsive ReST RESTFul Rich text RSS Safari sandbox sanity schedule scrum search security SEO sessions setup shipping site builder source spell SQL Injection SSL SSO standards store stSoftware support survey Swagger Task template testimonial Threads timezone tinyMCE Transaction Search trigger twitter twitter bootstrap Ubuntu unit tests unsubscribe URL validation WC3 AAA web folders web services webdav windows 8 wizard workflow WYSIWYG XLS XLST XML XPath XSS
    Reporting facilities

    There are many built in reports created in the screen painter. 

    Jasper Reports can be designed and uploaded for more complex reports 

    External tools such as Open Office or Excel can be used to generate reports via JDBC or ReST web services.


    by:Nigel Leck - 13 Dec 2013
    What are the supported browsers?

    Supported desktop browsers

    1. Chrome
    2. Firefox
    3. Safari
    4. Internet Explorer

     

    Supported tablets

    • iPad 2+ with iOS7+
    • Android tables 4.3+

     


    by:Nigel Leck - 13 Dec 2013
    System security overview

    Overview

    stSoftware designs systems to meet or exceed all aspects of the Australian Government Protective Security Policy Framework PSPF. At stSoftware, we take security very seriously. Our ephemeral workload servers are locked down to be accessed only via bastion hosts; the support team can only access the bastion hosts themselves via secure shell from specific IP addresses. 

     

    stSoftware follows Infrastructure as Code principles for all AWS services.


    by:Nigel Leck - 13 Dec 2013
    Rotating Banner ads

    yes, the site owner can/should be able to change anything.

    And technically they can as it's all just JavaScript/HTML/CSS.

    An example is
    SRL when they publish an article the banner image is placed on the carousel and linked to the article. The page reads this information from the RSS feed. 

    Article Banner

     

    carousel


    by:Nigel Leck - 27 Nov 2013
    What coding standards are used by stSoftware?

    Our Java coding standards can be found here which are adopted by all our developers. 

    We follow Agile development processes, which includes writing automated unit tests for business logic. This allows systems to evolve with confidence.

    Self test results

    References:-

    • Original stSoftware coding standards document.

    by:Parminder Singh - 27 Nov 2013
    What are the security, back-up, disaster recovery and firewall services?

    Security

    Industry standard best practice for passwords for both the web server and Linux machines. Site designers do not have direct access to the underlying Linux server, the raw database or files. All changes are done within sandbox of the system. 


    by:Tina Odling - 26 Nov 2013
    Easily integrated with other web applications through open standards.

    Users may access all allowed data via the Web Forms or via Industry standard protocols such as:

    • ReST which returns data in both JSON and XML formats. 
    • SOAP 
    • WebDav
    • ICal 
    • GWT RPC
    • JDBC

    All requests for data or modification to data goes via the DAL ( Data Access Layer) no matter which protocol is used. There is NO direct access to the underlying data store. The DAL checks the ACLs ( Access Control Limits ) for each data request and performs all validations on each data modification. When data is modified


    by:Tina Odling - 26 Nov 2013
    Page: 1..567..13