No edit summary |
No edit summary |
||
Line 120: | Line 120: | ||
[[Information security|How MDriven Turnkey does it – every time]] | [[Information security|How MDriven Turnkey does it – every time]] | ||
How the access control system is constructed in MDriven | [[Access control system in MDriven|How the access control system is constructed in MDriven]] | ||
[[Category:The MDriven Book]] | [[Category:The MDriven Book]] |
Revision as of 06:26, 16 June 2023
What is MDriven
Information design
Short introduction to UML– class diagram
How do I know if it is correct?
Composite and Aggregate and what they imply
Derived attributes & associations
The ViewModel
What an Action can do
BringUpViewModel & ViewModelRootObjectExpression
ViewModelIsModal & ExpressionAfterModalOk
Microsoft Office and OpenDocument as a Report generator
Prototyping
This is how you do Prototyping with MDriven
Security concerns for MDriven Server
MDrivenServer periodic server-side actions
Other uses of Server side Actions
- Emailing from the server
- Importing data from other SQL sources
- Producing export files from MDriven Server
Shaping and transforming export files
What is Object Constraint Language
OCL, EAL, OCLps Introduction
Efficient fetch – real case (advanced – skip until you have the need)
Creating your own MDriven Turnkey instance in your Azure account
Set up MDriven Turnkey on premise
Turnkey architecture
Security
Building safer software systems