Nieuws voor ontwikkelaars

[logo] The Register   more  xml  hide  
last updated: Thu, 05 Mar 2015 07:18:48 GMT

 Thu, 05 Mar 2015 05:57:03 GMT 'Hi, I'm from Microsoft and I am GOING TO KILL YOU'

Tech support scammer says hit squads roaming Canada, eliminating holdouts

Apparently, the growing hobby of tagging along with “Microsoft tech support” scam calls to waste their time is starting to bug the scammers, with a Canadian man reportedly threatened by a caller from India.…

 Thu, 05 Mar 2015 05:31:08 GMT 'Domain shadowing' hijacks registrar accounts to spawn attack sites

Industrialised hack site creation exploit on the rise

Fiends behind the world's most infamous exploit kit Angler are stealing login credentials to create tens of thousands of pop-up domains used in hit-and-run -style attacks.…

 Thu, 05 Mar 2015 05:01:08 GMT IBM's secret growth plan is … Karaoke?

♫ I guess that's why the call it Big Blue ♫

IBM might be planning a karaoke-led-resurgence, if a new patent titled “Enhancing karaoke systems utilizing audience sentiment feedback and audio watermarking” is any guide.…

 Thu, 05 Mar 2015 04:33:11 GMT Huawei to build 5G patent book

100 billion royalty payments can't be wrong

MWC1015 Huawei has talked up its plans for 5G at Mobile World Congress, with an emphasis on building its patent book for the next mobile standard.…

 Thu, 05 Mar 2015 04:00:08 GMT .hotels. .hoteis ... not a typo but a window into ICANN's baffling world

DNS overlord wins independent review over dot-word, flags flawed system

Analysis Domain-name overseer ICANN is facing widespread criticism after it emerged victorious from an independent review into its decision over the top-level domain .hotels.…


  more  xml  hide  
last updated: Wed, 04 Mar 2015 21:56:40 GMT


[logo] Latest News from JAVA Developer's Journal   more  xml  hide  
last updated: Thu, 05 Mar 2015 05:19:28 GMT

 Wed, 04 Mar 2015 17:30:00 EST How to Support Agility By @Plutora | @DevOpsSummit [#DevOps]
The challenge facing today’s project management professionals is supporting a more agile approach to software releases while managing orderly governance and production controls that are necessary. Project managers have become air traffic controllers landing more projects more frequently on more runways, and as the skies become more crowded it’s important to understand both the trends and some strategies for managing the increasingly agile enterprise.

read more

 Wed, 04 Mar 2015 16:15:00 EST Free Load Balancer for DevOps From @KEMPtech | @DevOpsSummit [#DevOps]
The free version of KEMP Technologies' LoadMaster™ application load balancer is now available for unlimited use, making it easy for IT developers and open source technology users to benefit from all the features of a full commercial-grade product at no cost. It can be downloaded at FreeLoadBalancer.com. Load balancing, security and traffic optimization are all key enablers for application performance and functionality. Without these, application services will not perform as expected or have the required resilience. During testing and development, open source and free components, including load balancers, are often used for a frictionless experience free of sales and procurement processes or the red tape that comes along with support and services contracts. However, many of these solutions have limitations that make it impossible to truly replicate the interactions that will happen in a full production infrastructure once the development team creates the iterative link for the service or application to operations in the typical DevOps model.

read more

 Wed, 04 Mar 2015 14:00:00 EST Cultivate Trust in Your Organization by @IanKhanLive | @CloudExpo [#Cloud]
Trust is the fundamental building block of any relationship. Whether it's personal or business, trust is something that cannot be replaced with anything. There are hundreds of books available on how to cultivate business relationships, how to maintain them, and how to leverage the best from them and so on. What forms the basis of a business relationship and what are the fundamental blocks of building trust? Here are three things that will get you started when thinking about using trust building trust and maintaining trust.

read more

 Wed, 04 Mar 2015 11:00:00 EST Logentries and Logstash Integration | @DevOpsSummit [#DevOps]
Log data provides the most granular view into what is happening across your systems, applications, and end users. Logs can show you where the issues are in real-time, and provide a historical trending view over time. Logs give you the whole picture. Logstash is an open source tool for managing events and logs. It is used to collect, search and store logs for later use. If you are using Logstash to collect logs from across your infrastructure already, and you are looking for more sophisticated log analytics tool, you are in the right place.

read more

 Wed, 04 Mar 2015 10:00:00 EST Omni-Channel Monitoring in Real Life By @KEnzenhofer | @BigDataExpo [#BigData]
In September, Macy’s announced that they will invest $1 Billion into their omni-channel strategy. When spending so much money the question that immediately comes up is how to measure the success? Key questions such as “Are conversion rates increasing as planned?” and “How good is the User Experience for each channel?” need answers. Since my first blog about omni-channel monitoring, I came across a variety of customer implementations. Today, I want to share with you how Solocal Group, provider of the French Yellow Pages (PagesJaunes), brings all key metrics together on a single dashboard.

read more

 Wed, 04 Mar 2015 09:00:00 EST Dispelling The Myths Of Agile By @TheEbizWizard | @DevOpsSummit [#DevOps]
Do you like the idea of Agile software development, but you don’t think it’s a fit at your organization? Perhaps your enterprise is too rigidly hierarchical, or maybe your projects are too large and complex for Agile? Think again. Agile is well on its way to becoming the standard approach for developing software, even for immense, complex applications for enterprise use. Just ask the United States federal government. That’s the news from this week’s Agile in Government: Mutual Adaptation conference, put on by The Association for Enterprise Information (AFEI), a government IT-focused nonprofit organization. This conference focused in particular on adapting Agile to the government’s labyrinthine acquisition policies and procedures, and vice versa.

read more

 Wed, 04 Mar 2015 08:00:00 EST Advice for the New On-Call Engineer By @VictorOps | @DevOpsSummit [#DevOps]
There is more to being on-call than just knowing how to type in the latest ChatOps commands, reboot AMIs and print out java stack traces. There are life skills that come from being on-call for a while and fortunately, those are lessons that can be taught. Here at VictorOps we’re currently adding six new engineers to our on-call roster, so I’ve been thinking about the experience of being on-call and how to make the best of it. The first day you go on-call can be frightening. The most important thing to remember is that you’ve already passed the first test. You have the trust and respect of your teammates and are providing them with a valuable commodity: peace of mind. No one wants to be on-call, so stepping up to the plate and taking shifts helps to improve the lives of everyone on your team.

read more

 Wed, 04 Mar 2015 03:30:00 EST Internet of Things: The Possibilities By @Plantronics | @ThingsExpo [#IoT]
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps still in play, as the industry strives to create a cohesive, secure, scalable, and beneficial network of ‘things.’

read more

 Mon, 09 Feb 2015 09:00:00 EST NodeSource Raises $3M
NodeSource, an enterprise-focused software company created to build a robust product ecosystem around Node.js, has announced a $3M in first round seed funding from Crosslink Capital and Resolute Ventures. This funding exemplifies the pent-up demand for Node.js solutions as enterprises abandon their monolithic applications in favor of modern, scalable service oriented architectures. NodeSource's portfolio of clients includes Uber, PayPal, Fitbit, and Netflix. The company delivers powerful Node.js tooling to enterprise customers. The company will use funding to continue expansion with the release of upcoming products and partnerships with Fortune 500 companies. Early on, NodeSource recognized the massive opportunity for Node.js to transform IT organizations worldwide. With current funding, a new generation of products from NodeSource will roll out to better build, monitor, tune, and deploy Node.js applications effectively.

read more

 Fri, 06 Feb 2015 10:00:00 EST A Guide to the CIO’s Toolbox By @Vormetric | @CloudExpo [#Cloud]
In my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015 Insider Threat Report, the insider threat landscape is becoming more difficult to deal with as the range of miscreant’s moves beyond employees and privileged IT staff. It now includes outsiders who have stolen valid user credentials; business partners, suppliers, and contractors with inappropriate access rights; and third-party service providers with excessive admin privileges. Unless properly controlled, all of these groups have the opportunity to reach inside corporate networks and steal unprotected data.

read more

 Mon, 26 Jan 2015 16:00:00 EST Gates Foundation & Our IoT 2040: Nice Contrast
The Bill and Melinda Gates Foundation recently identified four keys areas in which to focus for the next 15 years: Health, Farming, Banking, and Education. Bill himself holds forth on a regular basis about the challenges facing many billions of people in the world, particularly in Africa, as well as the opportunities to save lives and change lives. He does not seem naïve about the enormity of the challenges, and does not offer technology as a simple panacea to what ails the world. He also seems committed to respecting national sovereignty in implementing programs, difficult as that may be sometimes. And he seems to understand very clearly that even the vast wealth of his and his wife's foundation and its allies cannot hope to achieve signficant results on its own. I would add Energy, Transportation, and Government to Bill's and Melinda's list–aware that the Foundation supports these areas and many others as well. In our efforts at the Tau Institute, we then focus on how the Internet of Things will play a role in these areas as well as societal improvement and transformation overall. We've also chosen a 25-year timeframe, an thus use the term IoT 2040 to describe our activities. Our program includes research, events, consulting, and technical education. We have four overriding goals: 1. To spur beneficial economic development in all corners of the world 2. To reduce poverty & disease 3. To curtail violence as a way of settling disputes 4. To produce political and societal leaders who will maintain progress We think a good way to measure progress is through the research we've been conducting for the past few years, which creates relative,"pound-for-pound" rankings that show how well nations are doing with respect to their available resources. Our rankings reflect a lot of time spent, by me and by our associates and advisors, living in the various corners of the world. We integrate several technology and social factors into our algorithms -- on the one hand including average bandwidth, access to broadband, number of dataservers, on the other hand including income disparity, perception of corruption, human development, and the local cost of living. The most dynamic countries should correlate well over time with those most quickly growing their economies in an equitable way.

read more

 Mon, 26 Jan 2015 13:00:00 EST JavaScript for Java and C++ Developers By @YFain | @ThingsExpo [#IoT]
This year I’m planning to run a one day workshop at a couple of software development conferences and privately for IT shops. The goal is to introduce JavaScript and related technologies to developers that are accustomed to developing in classical object-oriented languages like Java, C++ or C#. Below is the outline of this workshop.

read more

 Sun, 25 Jan 2015 00:00:00 EST Vietnam Shines In Our IT Research
There's something extraordinary going on in Vietnam, and I'm not sure everyone sees it. The country blazes from the dry pages of our research printouts, its incandescence obscuring its neighbors and making our office fire alarms nervous. Among the 105 nations we now survey, Vietnam will finish in or near the Top 20 in the world in our overall ranking, when we announce our latest results next month. It will be near the top in Asia. Our overall ranking integrates several socio-economic and technological factors. Additionally, Vietnam will rank near the top of the world in our pure tecnology development ranking. In contrast, Vietnam continues to lag in the traditional economic development rankings that I've read. The United Nations' Human Development Index places it 121st among 187 nations, tied with Guyana and trailing even Syria and Iraq. It fares a little better in the World Economic Forum's Global Competitive Index, finishing in a tepid tie for 65th among 144 nations, in the neighborhood of Peru, Colombia, Slovenia, and India. Another ranking, the Asia Cloud Computing Association's Cloud Readiness Index, places Vietnam dead last among 14 nations surveyed. Damned Lies & Statistics The country's mediocre to poor rankings in these surveys and others is no doubt strongly tied to less than $2,000 in per-person income, ranking around the bottom quartile of world incomes. Compare this amount to about $2,800 in the neighboring Philippines, $5,600 in Thailand, and $7,000 in China. Yet this statistic, as with all single statistics, doesn't tell the whole story. Our research takes the view that relative developmnt is the key; that is, how well is a country doing given its current economic resources. How strong are its underlying IT infrastructure and overarching societal development with respect to its overall wealth? And how dynamic is its environment? How quickly is its pace of change increasing? By these measures, Vietnam is a star. Its global buzz has diminished recently, as years of rapid development following enactment of doi moi (renovation or innovation) reform policies in 1986 led to uneven development and societal stress. Indeed, our research also shows Vietnam running “too hot” in our Goldilocks Index of pure technology development. How long can it sustain its current pace? (More later...)

read more

 Thu, 01 Jan 2015 09:00:00 EST Musings on 2014 By @JnanDash | @ThingsExpo [#IoT #Cloud #BigData]
Another year comes to a close. What did we see as significant technology events? In the disruption category, we saw Uber getting valued at $41B even with all its issues in the news. When you disrupt an entrenched business such as taxi service, it is only natural that resistance will happen. But consumers like me love the value-added service from Uber. This is unstoppable as evident from the investor’s confidence in providing $1.2B funding. In the disruption category, companies like Snapchat, Instagram, Airbnb, Instacart, and others made good progress. Re-imagination is the catchword here. See my blog on that topic.

read more

 Tue, 30 Dec 2014 15:00:00 EST Pushing Data to Multiple WebSocket Clients From a Java Server By @YFain | @ThingsExpo [#IoT]
Finished writing the WebSocket chapter for the second edition of my Java 24 Hour Trainer. In this blog I’ll show you one of the code samples from lesson 28. Pretty often you need to write a program that publishes the same message to all connected clients. For example, multiple clients of the online auctions have […]

read more

 Mon, 29 Dec 2014 23:00:00 EST Internet of Things and Embedded Analytics By @ABridgwater | @ThingsExpo [#IoT]
Now is the age of information analytics. We have (very arguably) reached a point where the insight arising from data analytics can be applied to almost every aspect of a company, in every business vertical. But what shape should that analytics be? Increasingly we talk about embedded analytics, but what do we mean? Should we be embedding analytics inside a) applications themselves, or should we b) look to embed analytics as business rules inside complete corporate processes – or should it be both?

read more

 Thu, 18 Dec 2014 12:00:00 EST When to Mix the Blue: @IBMBluemix and @Azure | @DevOpsSummit [#DevOps]
While the initial usage of the Cloud Platform was clearly for the IaaS offerings, the trend is shifting and the PaaS delivery model is gaining a lot of attention. Most of the analysts like IDC and Gartner have predicted huge growth for PaaS in the coming years. IDC predicts Platform as a Service (PaaS) and cloud storage services will be the fastest-growing categories, driven by major upticks in developer cloud services adoption and Big Data-driven solutions, respectively.

read more

 Fri, 12 Dec 2014 09:45:00 EST Web Components in 2015 By @warpech | @CloudExpo [#Cloud]
Web Components are a collection of emerging web browser standards that are on a path to significantly change the way we develop UIs of web applications – a paradigm shift in web development. With polyfills already available in all modern web browsers, and full native support in Google Chrome, now is the perfect time to learn how you can benefit from using Web Components in your next project. In this article, you will learn about Web Components basics, available frameworks, Custom Elements, as well as challenges and applications associated with this new technology. After reading this article, developers will have enough background information to begin dabbling in Web Components.

read more

 Fri, 21 Nov 2014 16:45:00 EST How Mobile and Cloud Are Transforming Industry in a Human-Centric Way
Change is constant, and over the last decade the nexus of two trends in particular has transformed the enterprise. Mobile technology and cloud software are fundamentally changing the way we interact internally within businesses, and externally with partners and customers. Never before have workers enjoyed such freedom and flexibility. The days of being tied to a desk, manning a landline, are gone. Distributed teams can collaborate easily via virtual workplaces. Mobile technology provides access to the business world from any location and the cloud delivers the necessary data and software.

read more

 Mon, 01 Sep 2014 09:00:00 EDT Unified, Comprehensive and Easy-to-Use IT Systems Monitoring
This one-hour webinar will cover the core benefits and features of up.time, including how up.time proactively monitors, alerts and reports on the performance, availability, and capacity of all physical servers, virtual machines, network devices, applications, and services. We’ll take you through the up.time Dashboards, show you how alerting and action profiles work, and dive into up.time’s deep reporting capabilities, including SLA reports. In the end, you’ll know how up.time works and what up.time can do for your company.

read more

 Fri, 29 Aug 2014 10:15:00 EDT Yakov Fain's (@yfain) Blood Pressure At @ThingsExpo
In June I was presenting at the ThingsExpo conference  at the Javits Center in New York City. During my talk I was demonstrating how to integrate consumer devices into a business workflow. In particular, I was doing live measuring of my own blood pressure to show how to integrate consumer devices into a business workflow. Internet […]

read more

 Sun, 24 Aug 2014 13:53:00 EDT Setting up a Workspace in Eclipse for Desktop Application Development
This tutorial is primarily for the students in my 420-517 Software Development Project course at Dawson College. It explains how to set up a workspace in Eclipse for this course. These instructions are important because Eclipse stores workspace specific settings in the workspace itself. This means that should you create a new workspace you will need to redo these settings. When you start Eclipse you are asked for the name of the workspace you want to use. If this is the first time you are using Eclipse the workspace launcher will appear as:

read more

 Tue, 19 Aug 2014 16:23:35 EDT Let the Logs do the Talking
You are on top of your game. You have a log analysis tool churning logs from all your applications and infrastructure. And now that you have data (LOTS and lots of data…), you are able to understand your infrastructure better than you ever did before. You might even build a dashboard or two that tells you what is going on with your IOPS and utilization, at a glance.

read more

 Mon, 18 Aug 2014 12:56:00 EDT What’s the Difference Between Abstract Classes and Interfaces?
Probably the most popular question during Java technical interviews is “What’s the difference between abstract classes and interfaces”. In my own three year old book I’ve offered the following answer: “An abstract class may contain code in method bodies, which is not allowed in an interface.With abstract classes you have to inherit your class from the abstract one because Java does not allow multiple inheritance. On the other hand, you can implement multiple interfaces in your class.”

read more

 Fri, 15 Aug 2014 13:54:44 EDT Why We Love Log Management (and You Should Too)
It doesn't matter if your title puts you in Ops, Dev, or DevOps, being able to track down the big insights from your data is the secret-sauce every engineer is looking for. Collecting the data is a step in the right direction, but organizing, tagging, monitoring, and reporting from the data provides the insights necessary to make business decisions. Log data is a huge piece of that puzzle, and a good log management tool can really help your business run more efficiently. Our team loves log management, and internally, we use log data for a wide variety of use cases: from monitoring our own servers and software, to tracking user's behavior in our platform, as well as applying anomaly detection to let us know when something important has changed.

read more

 Fri, 15 Aug 2014 13:46:00 EDT Evolve Don’t Revolve
Logs have been around for a while, not quite as long as the wheel, but not far off. Here at Logentries, we have the mantra of evolve don’t revolve (as in don’t sit around spinning your wheels getting nowhere). We are taking this concept and looking to evolve the way you work with and think about your log data.

read more

 Fri, 15 Aug 2014 13:42:22 EDT JSON Logging in Apache and Nginx with Logentries
We’ll discuss configuring Apache and Nginx both to send JSON formatted logs and how to take advantage of the search functions, sharable dashboards, and reporting capabilities within the Logentries platform. I'm often asked on calls with our customers what is the preferred format for log data being sent to Logentries. While we pride ourselves on being the Log Management tool that is easiest to setup and use, some very important advanced features of the platform are available for logs that are formatted into Key Value Pair (KVP) or JSON. Most applications and programing languages have the ability to change their logging format. With a little bit of work, you can unlock the full potential of our advancedsearch functions. Below we'll discuss configuring Apache and Nginx both to send JSONformatted logs and how to take advantage of the search functions, sharable dashboards, and reporting capabilities within the Logentries platform.

read more

 Sun, 10 Aug 2014 22:32:00 EDT JavaFX Event Handling and Property Binding
Some time ago I blogged that Java Swing should be deprecated and replaced with JavaFX. In this blog I’ll show a piece of JavaFX namely event handlers and binding. I’ve created a simple Sign In window with a GridPane layout (it’s JavaFX equivalent of Swing’s GridBagLayout). I’m not going to spend much time on the GridPane itself, but will show you a basic event handling and a binding. In JavaFX an event object is represented by the instance of the class javafx.event.Event. There are different ways of handling events. Depending on how you structured your application you can handle events either in Java or in FXML. In this blog I’ll do everything in Java, where you can process events using one of the following techniques:

read more

 Thu, 07 Aug 2014 15:21:33 EDT Tailing All Your Logs, All in One Place
Logentries new Aggregated Live Tail provides effortless, real-time visibility that you cannot get anywhere else…and is a joy to use (and I cant say the same about carrying a cat by its tail – for so many reasons). For those of you not familiar with our existing Live Tail view, Aggregated Live Tail is a simple, elegant and powerful product enhancement that enables you to now select and monitor multiple live logs streaming into Logentries. All events are visible in real-time in a combined view of your log events as they happen. This allows users to monitor multiple streams of data, from across multiple sources, in live mode! What makes this even more powerful is the ability to filter the live incoming events to only display the ones you want, and finally be able to filter out the noise.

read more

 Thu, 07 Aug 2014 08:00:00 EDT Oracle Customers Secure Critical Encryption Keys with Oracle Key Vault
Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms. As organizations increasingly encrypt data at rest and on the network, securely managing all the encryption keys and credential files in the data center has become a major challenge. At the same time, organizations also need to comply with stringent regulatory requirements for managing keys and certificates. Many global regulations and industry standards call for audits demonstrating that keys are routinely rotated, properly destroyed, and accessed solely by authorized entities.

read more

 Sun, 03 Aug 2014 16:00:00 EDT Mission Critical App Server Market to Reach $23.1 Billion by 2020
Application Server Market Company Profiles: 360 Logica, Actuate, Adobe, AgilePoint, Appian, Aurea, BigAgi, BizFlow, BonitaSoft, CA Technologies, Crosscheck Networks, EMC, Fabasoft Group, Fiorano, Fujitsu, GSX, Hewlett Packard, HostBridge, IBM, Informatica, Intalio, iWay Software, K2, Kofax, Layer 7, Managed Methods, Mendix, Microsoft SOA, Nastel Technologies, Newgen, Novell, OpenText, Crosscheck Networks, Oracle, Perceptive Software, PegaSystems, Perficient, Pivotal, PNM Soft, Progress Software, Rally Software, Red Hat, SAP, SOALIB, SOA Software, Software AG, Tibco Revenue, VMWare, WSO2.

read more

 Sat, 02 Aug 2014 13:15:00 EDT Fulfilling IT's Promise in the "Internet of Things" Era
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at Internet of @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of disruption that could fundamentally reshape the function of IT forever.

read more

 Mon, 21 Jul 2014 17:29:00 EDT Closures in Java with Lambdas
While working on the second edition for my Java 24-hour Trainer book I’m re-writing some of the code samples to use lambda expressions. Today I was re-writing an example for wait/notify for the chapter on multi-threading. Beside illustrating the wait/notify, I used a closure in this example. Since Java closures are not well presented in the blogosphere, I decided to write a quick blog on the subject. My goal was to write a program that starts a thread and waits for the notification from that thread until its execution is completed. When the main thread receives the notification from the second thread it continues processing.

read more

 Tue, 15 Jul 2014 16:57:00 EDT Working on the Java Tutorial, Second Edition
In 2011 Wiley (Wrox) published my book “Java Programming. 24-Hour Trainer“. To be honest, I don’t like the title because it misleads people as if this book promises that the reader can learn Java within 24 hours. But creators of this series (many titles were published under this umbrella) meant to say that this book was like your personal instructor; 24 hours a day. Whatever. It’s not my call. But earlier this year I got a call from the publisher stating that they’re happy with the book sale numbers and want me to update the book and release the second edition reflecting the latest changes in the Java Language. I agreed because with the latest release Java became more interesting than ever. The magnitude of changes to the Java 8 language and APIs can be compared with Java 5 that was released back in 2004. It’s exciting to program in Java again.

read more

 Sun, 22 Jun 2014 02:27:00 EDT Long Polling Explained
This article defines long polling and presents a few techniques on how long polling could be used in Spring MVC web applications. Discussion covers both the AJAX and the server part of the solution as well as outlines a few possible options for implementation. The article compares performance of the two server side approaches and describes a practical example of long polling application.

read more

 Fri, 20 Jun 2014 10:20:20 EDT OpenXava 5.0 Released
OpenXava is an Java Framework for Rapid Development of Enterprise Web Applications. In OpenXava you only have to write the domain classes in plain Java to get a web application ready for production. This 5.0 release has a new look & feel, includes module navigation, user login/logout (so you do not need Liferay anymore), inline editable collections (just like a spreadsheet), a new editor to attach files to your entity, and many many more things.

read more

 Mon, 14 Apr 2014 11:00:00 EDT Sync Your Timeouts: When Load Balancers Cause Database Deadlocks
Have you seen this error message before “java.sql.Exception: ORA-00060: deadlock detected while waiting for resource”? This is caused when parallel updates require locks on either rows or tables in your database. I recently ran into this exception on an instance of an IBM eCommerce Server. The first thought was that there are simply too many people hitting the same functionality that updates Sales Tax Summary information – which was showing up in the call stack of the exception: The logical conclusion would be to blame this on too many folks accessing this functionality or outdated table statistics causing update statements to run too long causing others to run into that lock. It turned out to be caused by something that wasn’t that obvious and wouldn’t have shown up in any Exception stack traces or log files. A misconfigured timeout setting on the load balancer caused a re-execute of the original incoming web request. While the first app server was still updating the table and holding the lock – as it had a longer timeout specified as the load balancer – the second app server tried to do the same thing causing that exception.

read more

 Fri, 11 Apr 2014 16:11:00 EDT HTML5 and the Future of PhoneGap and WebView+
HTML5 is still one of the most discussed topics amongst us technical types. The key challenge, however, has remained unanswered for a long time. How do you effectively wrap HTML5 for use in native mobile applications? Unfortunately I do not have a universal answer, but I do have a solution for Android. Firstly, I recommend looking into the use of Vellamo in order to benchmark the performance of HTML5 on Android. Vellamo is designed to be an accurate, easy to use suite of system-level benchmarks for devices based on Android 2.3 forward. Vellamo began as a mobile web benchmarking tool that today has expanded to include two primary chapters: the HTML5 chapter evaluates mobile web browser performance; and the Metal Chapter measures the CPU subsystem performance of mobile processors. Firstly, I recommend looking into the use of Vellamo in order to benchmark the performance of HTML5 on Android (http://www.quicinc.com/vellamo/). Vellamo is designed to be an accurate, easy to use suite of system-level benchmarks for devices based on Android 2.3 forward. Vellamo began as a mobile web benchmarking tool that today has expanded to include two primary chapters: the HTML5 chapter evaluates mobile web browser performance; and the Metal Chapter measures the CPU subsystem performance of mobile processors.

read more

 Fri, 04 Apr 2014 15:20:00 EDT WebSphere Datapower Configuration for Database
The purpose of this article is to describe the steps involve to configure Datapower service for the Database communication. The service will parse the incoming parameters from the request, construct a SQL query string and returns the data from the Database, based on the constructed query. For the demonstration, the following table "DataPowerTest" is created in MS SQL Server. The following columns and data were added as well.

read more

 Mon, 31 Mar 2014 10:00:00 EDT Using a Performance Management Database to Identify Network Problems
Two weeks ago I wrote about how the world’s largest exporter of dairy products uses SAP to support their huge delivery chain of dairy products. We recounted how Fonterra used an Application Performance Monitoring (APM) tool to discover that additional training for employees was necessary to speed up certain critical SAP transactions: some employees weren’t optimizing attributes passed to the reports based on custom T-Codes. Unfortunately, additional SAP training cannot solve all the problems. Separately and unrelated to the training issues, Fonterra started to notice that end-to-end SAP transactions were much slower than usual; especially during the summer months. Correlating long-term network performance data, such as loss rate or RTT measures, with end-to-end SAP transaction response times revealed the actual network problem caused by something nobody thought about.

read more

 Mon, 31 Mar 2014 08:00:00 EDT The Great Java 8 Debate
Java 8 has been reengineered and the most significant enhancement in this release is Project Lambda Expressions for the Java Programming Language. To be more comprehensive, the standout features of JDK 8 are Project Lambda the Nashorn JavaScript Engine and a new Date and Time API. Al Hilwa is program director for software development research at IDC and he says that right now, with this release, the changes related to Lambda expressions are the most important single new thing in SE 8.

read more

 Fri, 28 Mar 2014 10:15:00 EDT APM & MoM - Symbiotic Solution Sets
Maximum productivity can be achieved more efficiently through event correlation, system automation and predictive analysis. Making that a reality however, requires consideration on how to manage the integration touch points from multiple toolsets and openness to the intrinsic value that this integration can provide. A focus on integration techniques, and not necessarily the monitoring technologies themselves, may be a better use of time to achieve a state of harmony within the event to incident flow. When rolling out an Application Performance Management (APM) solution, selection of your Manager of Managers (MoM) and how it will support the overall solution is critical. The assumption underpinning MoM is that the time to market and technical accuracy can be achieved more readily by allowing the Subject Matter Experts (SMEs) to select their own tools sets and not worry so much about controlling every monitoring tool on the periphery. This encourages timely configuration and ownership of the SME's individual systems making fine tuning the alerting levels into MoM much easier.

read more

 Tue, 25 Mar 2014 08:00:00 EDT Oracle Announces Java 8
Oracle has announced the availability of JDK 8, a production-ready implementation of the Java SE 8 Platform Specification, which was recently approved through the Java Community Process (JCP). This release includes the largest upgrade to the Java programming model since the platform was introduced in 1996. JDK 8 was developed collaboratively in the OpenJDK Community. Oracle has also announced Oracle Java SE Embedded 8, which leverages the new Java SE 8 features and is optimized for mid to high end embedded systems. With a consistent Java 8 platform across embedded devices, desktops, data centers and the cloud, customers can deploy applications faster, process and analyze in-flight data and act on events as quickly as they occur.

read more

 Sat, 15 Mar 2014 16:00:00 EDT Application Performance Problems? When to Blame the Untrained End User
In my previous posts I wrote about how important it is to have end-to-end visibility into SAP in order to avoid serious problems in our delivery chain or to discover that application performance degradation was caused by malfunctioning hardware. One of our New Zealand customers, Fonterra, who is the world’s largest exporter of dairy products, uses SAP to support its delivery chain of dairy products made from 22 billion liters of milk collected each year. In this article we show how Fonterra uses a new generation of APM tools that provide both user and transactional insight, as well as complete end-to-end coverage to monitor its SAP infrastructure. Monitoring SAP infrastructure led Fonterra to quite surprising discoveries that some performance problems could be caused by insufficient SAP training or that milk churns block Wi-Fi signal in Fonterra warehouses; we will discuss the latter story in my upcoming blog post.

read more

 Thu, 06 Mar 2014 10:00:00 EST Design Patterns in Java LiveLessons Review
I have spent the past few weeks watching this video series. I started watching it on the treadmill in the morning before work. I did that until I hit lesson 5. It is 4 hours and 20 minutes long. I started watching lesson 5 in front of the computer, not because I didn't want to walk for over four hours, but because I wanted to look at the code you can download with these lessons. In lesson 5 covers a ton of patterns. The thing I like most about the way the patterns are introduced is that they are introduced working with other patterns. The way patterns should be used, together.

read more

 Tue, 04 Mar 2014 13:26:00 EST JavaScript Cross-Compilation Mobile App Development
Recently Famo.us made a big announcement around offering their own PhoneGap alternative using a WebView that could use Chrome instead of the Stock Android Browser. Android 4.4 (KitKat) actually offers this out of the box now but it is actually Chrome 30 which isn't quite up to the same feature set of Chrome 33. That means no WebGL or WebRTC, which is a real loss. There are also no plans to roll ChromeView to older versions of Android and the open source project with this intention has considerable issues at this stage, which is a shame. Famo.us plan therefore to bundle Blink (Chrome 33) with Apps in order to offer WebGL and other improvements to Wrapped Web Apps. The downside is of course the size of Blink which is somewhere between 10M and 30M depending on which tech forum you follow. Famo.us plan to get round this by offering a one-off download of a shared library, of course this would need to be updated when the next version of Chrome is released. They have a neat demo showing Chrome 33 features including WebGL running through a WebView on Android KitKat.

read more

 Mon, 03 Mar 2014 14:00:00 EST Three Tips to Gain Executive Buy-In on APM
Convincing the astute executive who is cautious in not making an impetuous decision on an APM investment can prove to be challenging. Consider the amount of due diligence that is brought to bear in the decision making process. The wide array of APM technologies that need to be reviewed can be intimidating. The selection criteria for application monitoring doesn't have to be an arduous one, lending credence to the idea that an APM solution can be simplified, understood, and implemented. I'm suggesting that the critical success factors in the adoption of APM center around the End-User-Experience (EUE) and the integration touch points with existing ITIL/ITSM processes.

read more

 Fri, 17 Jan 2014 12:00:00 EST Achieving Agile Transformation with Kanban, Kotter, and Lean Startup
Change in IT is the only constant that you find in IT. Even the methods for managing change, change. Resistance to change is an open invitation to the Grim Reaper of software development projects in decent size companies. I have mentioned this in other book reviews, and find that it applies here as well. I was sitting in a meeting some time ago with a company that was embracing Scrum like a ten year old being offered a warm plate of chocolate chip cookies. They were grabbing at it as fast as they're little hands could reach out and grab the goodies. Watching this made me wonder what is was about Scrum that made them embrace it so emphatically. They had claimed to be an Agile shop for years, but were still failing to deliver quality software on time within budget. In past years they refused every single proposed process improvement recommendation made by consultants.

read more

 Fri, 03 Jan 2014 14:15:00 EST Creating JavaServer Faces Maven Managed Projects with Eclipse
Step 1 Create a project based on my blog “UPDATED Setting up a JEE 6 Web Profile Maven Project in Eclipse using TomEE”. Step 2 Eclipse reveals its special capabilities such as specialized editors based on the project’s facet. As … Continue reading

read more

 Wed, 18 Dec 2013 06:19:00 EST Objective-C Programming: The Big Nerd Ranch Guide (2nd Edition)
This book is the perfect place for an experienced developer to start with iOS programming. I say experienced developer because this book does a great job of showing you the basics of C and the Objective-C language, but if you don't understand the basics of programming, you are probably going to get lost. Maybe not, but I found myself saying, "I am glad I already know what that is" about quite a few topics that were used to explain the subject matter. If you are experienced with C#, C, Java, or C++, you will be fine.

read more


powered by zFeeder