Technical Articles

1
Creating an Application with ExtJS and Alfresco

    Client part: Ext JS is a JavaScript library for building web applications and user interfaces. It supports AJAX technology, animation, working with DOM, implementation of grids, tabs, events handling. Server part: Alfresco – an integrated content management system for organizations...

    Alfresco ECM extension

      Alfresco ECM is a system for the organization of the company’s internal portal. Alfresco ensures joint work of employees by providing the following main features: The process of setting your own “Workflow” in Alfresco is described below by steps. This..

      Experience of VoIP Integration into Salesforce

        The article describes the implementation of integration between the Kazoo VoIP (Voice over Internet Protocol) platform and Salesforce CRM. The solution was implemented by the JazzTeam project team for a commercial provider in Europe. Initial task – Salesforce CRM users..

        REST testing based on Karate framework

          Karate is an open-source Behavior Driven Development (BDD) framework that allows conducting the following types of tests with no need to write additional code: REST API request testing. UI testing. Mocks writing. Load testing. Behavior Driven Development (BDD) is an..

          Bazaar installation and configuration

            Start with Bazaar downloading. In addition to Bazaar, the installer also contains Bazaar Explorer desktop app. It provides an easy-to-use interface for the version control system and bazaar svn plugin for Bazaar integration with Subversion repository. In addition to using..

            User Manual “Installer Creation Using Inno Setup”

              This article will focus on Inno Setup – a convenient tool intended to package applications for Windows OS. Why Inno Setup? “Inno Setup today rivals and even surpasses many commercial installers in feature set and stability,” the developer’s official website..

              SQL Injection

                SQL Injection is one of the possible ways to crack web applications connecting with SQL database (DB). This method is based on malicious code injection into the initial SQL script. For example, a hacker can do the following on a..

                Java Safety Development Guidelines

                  Java security architecture protects users and systems from intruders and incorrect code in many cases. Still, it cannot ensure protection against vulnerabilities created by development code. Development errors can unintentionally produce such software downfalls as access to files, printers, web..

                  Robot Framework overview

                    The purpose of the article is to describe Robot Framework, show the field of its applying and advantages of using it on the project, and also to share the approaches, which were used in practice. Robot Framework description Robot Framework..

                    Creating a Windows service on Java

                      One project required the development of a Windows service that could perform a number of actions using the Windows API, Websocket and standard Java tools. The article below gives the description of the steps that have been taken to create..