Skip to main content

Commerce Enable Nirvana on the way...

After deciding to bootstrap the launch of my site I had to get to work putting together the consumer facing pages that will allow internet users to quickly figure out our services and get started right away using the service. The last week has been days and nights of long and tedious task sessions tweaking html tables to look just so, rendering graphics and updating style sheet styles but I am fast approaching completion of the various pages for the site. One set of code that I am looking forward to is the code for enabling automatic e commerce. When I was working at TheStreet I was always curious about the commerce code used on the web site to register new accounts and confirm provided payment information. Since then I've picked up extensive knowledge of the software design process far beyond the knowledge of content management systems and xml feeds that I specialized in at my time with the company. Now, I am finally getting into the meat of a commerce system, and like all things that we investigate that was previously unknown territory, it isn't magic at all. Having designed my platform to operate in a distributed fashion, using polling and event actions between servers to effect dynamic load redistribution the idea of sending off user payment requests to an automated payment processor (I am leaning toward using paypal but have to do some more investigating) is very familiar indeed. I am looking forward to finally getting the interactions working end to end, probably the last bit of some what interesting code I'll be doing before launch.

Stay tuned!

Comments

Popular posts from this blog

Engineers versus Programmers

I have found as more non formally trained people enter the coding space, the quality of code that results varies in an interesting way.

The formalities of learning to code in a structured course at University involve often strong focus on "correctness" and efficiency in the form of big O representations for the algorithms created.

Much less focus tends to be placed on what I'll call practical programming, which is the type of code that engineers (note I didn't use "programmers" on purpose) must learn to write.

Programmers are what Universities create, students that can take a defined development environment and within in write an algorithm for computing some sequence or traversing a tree or encoding and decoding a string. Efficiency and invariant rules are guiding development missions. Execution time for creating the solution is often a week or more depending on the professor and their style of teaching code and giving out problems. This type of coding is devo…

Highly targeted Cpg vaccine immunotherapy for a range of cancer

Significance?


This will surely go down as a seminal advance in cancer therapy. It reads like magic:

So this new approach looks for the specific proteins that are associated with a given tumors resistance to attack by the body's T cells, it then adjusts those T cells to be hyper sensitive to the specific oncogenic proteins targeted. These cells become essentially The Terminator​ T cells in the specific tumor AND have the multiplied effect of traveling along the immune pathway of spreading that the cancer many have metastasized. This is huge squared because it means you can essentially use targeting one tumor to identify and eliminate distal tumors that you many not even realize exist.

This allows the therapy for treating cancer to, for the first time; end the "wack a mole" problem that has frustrated traditional shot gun methods of treatment involving radiation and chemotherapy ...which by their nature unfortunately damage parts of the body that are not cancer laden but …

AgilEntity Architecture: Action Oriented Workflow

Permissions, fine grained versus management headache
The usual method for determining which users can perform a given function on a given object in a managed system, employs providing those Users with specific access rights via the use of permissions. Often these permissions are also able to be granted to collections called Groups, to which Users are added. The combination of Permissions and Groups provides the ability to provide as atomic a dissemination of rights across the User space as possible. However, this granularity comes at the price of reduced efficiency for managing the created permissions and more importantly the Groups that collect Users designated to perform sets of actions. Essentially the Groups serve as access control lists in many systems, which for the variable and often changing environment of business applications means a need to constantly update the ACL’s (groups) in order to add or remove individuals based on their ability to perform certain actions. Also, the…