Recent Posts

    Authors

    Published

    Tag Cloud

    PCI
    Reporting facilities

    There are many built in reports created in the screen painter. 

    Jasper Reports can be designed and uploaded for more complex reports 

    External tools such as Open Office or Excel can be used to generate reports via JDBC or ReST web services.


    by:Nigel Leck - 13 Dec 2013
    What are the supported browsers?

    Supported desktop browsers

    1. Chrome
    2. Firefox
    3. Safari
    4. Internet Explorer

     

    Supported tablets

    • iPad 2+ with iOS7+
    • Android tables 4.3+

     


    by:Nigel Leck - 13 Dec 2013
    System security overview

    Overview

    stSoftware designs systems to meet or exceed all aspects of the Australian Government Protective Security Policy Framework PSPF. At stSoftware, we take security very seriously. Our ephemeral workload servers are locked down to be accessed only via bastion hosts; the support team can only access the bastion hosts themselves via secure shell from specific IP addresses. 

     

    stSoftware follows Infrastructure as Code principles for all AWS services.


    by:Nigel Leck - 13 Dec 2013
    Rotating Banner ads

    yes, the site owner can/should be able to change anything.

    And technically they can as it's all just JavaScript/HTML/CSS.

    An example is
    SRL when they publish an article the banner image is placed on the carousel and linked to the article. The page reads this information from the RSS feed. 

    Article Banner

     

    carousel


    by:Nigel Leck - 27 Nov 2013
    What coding standards are used by stSoftware?

    Our Java coding standards can be found here which are adopted by all our developers. 

    We follow Agile development processes, which includes writing automated unit tests for business logic. This allows systems to evolve with confidence.

    Self test results

    References:-

    • Original stSoftware coding standards document.

    by:Parminder Singh - 27 Nov 2013
    What are the security, back-up, disaster recovery and firewall services?

    Security

    Industry standard best practice for passwords for both the web server and Linux machines. Site designers do not have direct access to the underlying Linux server, the raw database or files. All changes are done within sandbox of the system. 


    by:Tina Odling - 26 Nov 2013
    Easily integrated with other web applications through open standards.

    Users may access all allowed data via the Web Forms or via Industry standard protocols such as:

    • ReST which returns data in both JSON and XML formats. 
    • SOAP 
    • WebDav
    • ICal 
    • GWT RPC
    • JDBC

    All requests for data or modification to data goes via the DAL ( Data Access Layer) no matter which protocol is used. There is NO direct access to the underlying data store. The DAL checks the ACLs ( Access Control Limits ) for each data request and performs all validations on each data modification. When data is modified


    by:Tina Odling - 26 Nov 2013
    Page: 1..567..13