Skip to content

Software Development News: .NET, Java, PHP, Ruby, Agile, Databases, SOA, JavaScript, Open Source

Methods & Tools

Subscribe to Methods & Tools
if you are not afraid to read more than one page to be a smarter software developer, software tester or project manager!

Java

NICOLETA TEMPLATE: dynamic testing on production

This article is a primer on the basic types of data compression, with an introductory explanation of the mathematics and algorithms that go into compression techniques. Brief consideration and examples are given to help you evaluate what types of compression tools and techniques are suited to your own applications. Pointers are provided to more advanced theoretical discussions and ready-to-use compression tools and libraries. [Update: Tables 1 and 2 were updated to correct formatting errors. -Ed.]
Categories: Java

Look Beyond the Big Data with the IoT

Java Developer's Journal - Tue, 08/05/2014 - 23:00
I've been writing recently about the dimensions of Big Data in the IoT: urgency, importance, frequency, consequences, remedy, cost. You can find my stories on IoT Journal or at my personal website. The big item missing from this list is, of course, size. How big are individual messages or files? A couple of kilobytes? Many megabytes? And are there still a lot of people who think of Big Data as massive, petabyte-size repositories of epidemiological, meteorological, or particle acceleration data? I didn't originally include it, because I saw it as twinned with frequency. In the IoT, most message & file sizes are going to be small. Big Data in the IoT has more to do with sensors and less to do with massive scientific apps. Frequency might mean a real-time sampling rate of 10 times per second, 100 times per second, or more. Or it may be tethered to a passive device that reports in a timeframe we can call “every once in awhile.” So the frequency dimension might vary by several million times from one application to another. Even if expressed logarithmically, that's a lot of variance. Nevertheless, I think I'll combine the two, and change one of the six categories to size/frequency. Pay to Play I go through all this because, in the end, someone has to pay for the dataflow and all tha supports it. Most analyses seem to focus on the amount of data being consumed and stores, ie the size/frequency dimension. But urgency and importance are mission-critical in setting up proper IoT monitoring, analysis, and the speed of that analysis. Furthermore, the consequences of something gone bad can vary from “there's a lightbulb out on the bridge” to “a section of the bridge just collapsed.” The dimensions of consequence and remedy are therefore potentially much more important to cost than the dataflow. Designing and deploying an IoT project, whether something fun like installing a smart public bench or something grave like monitoring traffic flow, is thus far more than an IT project. As we get involved in analyzing the cloud computing infrastructures that will no doubt underpin and serve most of the IoT, it's time to focus not only on cost-per-whateverbyte—the size/frequency dimension--but also the other dimensions, which tell us what this IoT thing is supposed to do and what happens when things go wrong.

read more

Categories: Java, Media

Joachim Arrasz: My Five Favorite NetBeans IDE Features

NetBeans Highlights - Tue, 08/05/2014 - 14:58
An article series about NetBeans users and their favorite features in the IDE. Joachim Arrasz, a developer and one of the founders of Synyx, a software development company in Germany.
Categories: Java, Open Source

Microsoft's Enterprise Internet Of Things Presentation @ThingsExpo (#IoT)

Java Developer's Journal - Tue, 08/05/2014 - 13:15
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems that integrate physical and digital supply chains with your enterprise systems, leveraging IoT devices, hybrid cloud and network service providers to enable innovative business models while mitigating risk, managing security and increasing capacity to meet customer changing SLA requirements.

read more

Categories: Java, Media

Improving Service Delivery Through Cloud

Java Developer's Journal - Mon, 08/04/2014 - 18:00
NNIT uses HP Cloud Service Automation to improve their deployment of IT applications and data, and to provide higher overall service delivery speed and efficiency. As a provider of both application development management and infrastructure outsourcing, Denmark-based NNIT needed a better way to track, manage and govern the more than 10,000 services across its global data centers. Beginning in 2010, the journey to better overall services automation paved the way to far stronger cloud services delivery, too. NNIT uses HP Cloud Service Automation (CSA) to improve their deployment of IT applications and data, and to provide higher overall service delivery speed and efficiency. To learn more about how services standardization leads to improved cloud automation, BriefingsDirect spoke with Jesper Bagh, IT Architect and cloud expert at NNIT, based in Copenhagen. The discussion, at the HP Discover conference in Barcelona, is moderated by me, Dana Gardner, Principal Analyst at Interarbor Solutions.

read more

Categories: Java, Media

How Classrooms Can Utilize Big Data

Java Developer's Journal - Mon, 08/04/2014 - 14:00
The widespread adoption of tablets and mobile devices in schools allows for tracking of key performance indicators that can help gauge the impact of specific initiatives on a student's future success. While skeptics argue against ethical concerns raised by such techniques, several college campuses are already testing the use of big data. Behavioral economists theorize that "when presented with many options and little information, people find it difficult to make wise choices." This is the root of the movement to incorporate Big Data into the classroom. By compiling student data from an early age, we are able to better understand learning processes and identify issues, ultimately resulting in wiser, more informed decisions. Now when a teacher threatens that "this will go down on your permanent record," they really mean it.

read more

Categories: Java, Media

New Possibilities with Cloud-Based Healthcare Records

Java Developer's Journal - Mon, 08/04/2014 - 13:00
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects – scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e., the largest single medical system in the United States.

read more

Categories: Java, Media

DevOps: The Operational Amplifier

Java Developer's Journal - Sun, 08/03/2014 - 21:45
When Instagram was sold to Facebook in 2012, it employed only 13 people and maintained over 4 billion photos shared by its 80 million registered users. Internally, Instagram was a small business. Externally, it was a web monster. Filling the gap between those two contradictory perspectives is DevOps. Now to be fair, Instagram (like many other web monster properties today) has it easier than most other businesses because it supported only one application. One. That's in stark contrast to large enterprises which are, by most analyst firms, said to manage not one but one hundred and even one thousand applications - at the same time. Our own data indicates an average of 312 applications per customer, many of which are certainly integrated and interacting with one another.

read more

Categories: Java, Media

Mission Critical App Server Market to Reach $23.1 Billion by 2020

Java Developer's Journal - Sun, 08/03/2014 - 21:00
Application Server Market Company Profiles: 360 Logica, Actuate, Adobe, AgilePoint, Appian, Aurea, BigAgi, BizFlow, BonitaSoft, CA Technologies, Crosscheck Networks, EMC, Fabasoft Group, Fiorano, Fujitsu, GSX, Hewlett Packard, HostBridge, IBM, Informatica, Intalio, iWay Software, K2, Kofax, Layer 7, Managed Methods, Mendix, Microsoft SOA, Nastel Technologies, Newgen, Novell, OpenText, Crosscheck Networks, Oracle, Perceptive Software, PegaSystems, Perficient, Pivotal, PNM Soft, Progress Software, Rally Software, Red Hat, SAP, SOALIB, SOA Software, Software AG, Tibco Revenue, VMWare, WSO2.

read more

Categories: Java, Media

Fulfilling IT's Promise in the "Internet of Things" Era

Java Developer's Journal - Sat, 08/02/2014 - 18:15
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at Internet of @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of disruption that could fundamentally reshape the function of IT forever.

read more

Categories: Java, Media

The Expanding Impact of Cloud Computing

Java Developer's Journal - Sat, 08/02/2014 - 15:00
It's become clear that the impacts and implications of cloud commerce are much broader and much more of a benefit to the business as a whole as an innovation engine, even across whole industries. Over the past five years, the impetus for cloud adoption has been primarily about advancing the IT infrastructure-as-a-service (IaaS) fabric or utility model, and increasingly seeking both applications and discrete IT workload support services from Internet-based providers. But as adoption of these models has unfolded, it's become clear that the impacts and implications of cloud commerce are much broader and much more of a benefit to the business as a whole as an innovation engine, even across whole industries. Recent research shows us that business leaders are now eager to move beyond cost and efficiency gains from cloud to reap far greater rewards, to in essence rewrite the rules of commerce.

read more

Categories: Java, Media

The ‘No-Compromise Cloud’

Java Developer's Journal - Fri, 08/01/2014 - 17:45
The public cloud computing model is rapidly becoming the world’s most prolific IT deployment architecture, yet it leaves many promises unfulfilled. While offering scale, flexibility, and potential cost savings, the public cloud often lacks the isolation, computing power, and control advantages of bare metal servers. Recent feedback suggests that people who adopted public cloud solutions for their elasticity and convenience are now lamenting their “simple” solution’s complexity. To deploy enterprise solutions with the public cloud, one must consider redundancies as a safety net for outages and other disasters, as well as more intricate network architecture for true interoperability.

read more

Categories: Java, Media

Data Privacy Perspectives: United States vs Europe & Reality vs Illusion

Java Developer's Journal - Fri, 08/01/2014 - 17:00
It’s time to face reality: "Americans are from Mars, Europeans are from Venus," and in today’s increasingly connected world, understanding “inter-planetary” alignments and deviations is mission-critical for cloud. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will discuss cultural expectations of privacy based on new research across these elements.

read more

Categories: Java, Media

Big Data's Potential in Helping to Secure the Internet of Things

Java Developer's Journal - Fri, 08/01/2014 - 16:00
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" – sensor, actuator, data source, data consumer, routing intermediary, etc., – is a new security-relevant detail that stirs up a wide range of collateral security issues. In other words, every new networked IoT endpoint is a new potential attack vector or launching point that the baddies can exploit. Potentially, every time you plug in a new IoT-networked device that is infected with malware or simply open to unauthorized third-party exploitation, the vulnerabilities start. Someone somewhere might exploit the new access point to gain illicit access to sensitive secrets (business, consumer, government, etc.), to damage software and data, and to wage distributed denial of service attacks.

read more

Categories: Java, Media

The Evolution of Internet of Things and the Intelligent Enterprise

Java Developer's Journal - Fri, 08/01/2014 - 14:00
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at Internet of @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, will discuss the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data and analysis are providing the pull to meet customer expectations of a widely connected, multi-dimensional universe of people, things, and information.

read more

Categories: Java, Media

Unified, Comprehensive and Easy-to-Use IT Systems Monitoring

Java Developer's Journal - Fri, 08/01/2014 - 11:45
This one-hour webinar will cover the core benefits and features of up.time, including how up.time proactively monitors, alerts and reports on the performance, availability, and capacity of all physical servers, virtual machines, network devices, applications, and services. We’ll take you through the up.time Dashboards, show you how alerting and action profiles work, and dive into up.time’s deep reporting capabilities, including SLA reports. In the end, you’ll know how up.time works and what up.time can do for your company.

read more

Categories: Java, Media

NetBeans Dream Team: Our Favorite NetBeans IDE Features

NetBeans Highlights - Thu, 07/31/2014 - 19:14
An article series about NetBeans users and their favorite features in the IDE. Zoran Sevarac, Kirk Pepperdine, and other NetBeans Dream Team members share their favorite NetBeans features.
Categories: Java, Open Source

Continuous Integration or Continuous Improvement?

Java Developer's Journal - Thu, 07/31/2014 - 18:00
One funny thing about DevOps is that it is often touted that constant, on-the-fly changes are the way of the future in operations, and DevOps enables those changes. While this sounds really good, and some organizations are actually doing this type of DevOps, I think it is time that, for the enterprise, we strongly question that premise. While it is really very cool to think about moving an entire web server from a farm to the cloud with just a script, upgrading a system while it’s hot, or spinning up more instances of a server without having to configure anything, I propose that, for the average enterprise, it is simply not necessary.

read more

Categories: Java, Media

Protecting the Network with Proactive Encryption Monitoring

Java Developer's Journal - Thu, 07/31/2014 - 14:30
Encryption is a key element of a complete security strategy. The 2013 Global Encryption Trends Study shows a steady increase in the use of encryption solutions over the past nine years. Thirty-five percent of organizations now have an encryption strategy applied consistently across the entire enterprise, up from 29 percent in 2012. The study showed that, for the first time, the main goal for most organizations in deploying encryption is mitigating the effects of data breaches. There is good reason for this shift: the latest Ponemon Institute research reveals that the cost of a data breach is $3.5 million, up 15 percent from last year. On the surface, the 35 percent figure seems like good news, until one realizes that 65 percent of organizations do not have an enterprise-wide encryption strategy. In addition, even a consistently applied strategy can lack visibility, management controls or remediation processes. This gives hackers the green light to attack as soon as they spot a vulnerability.

read more

Categories: Java, Media

Arriving at Actionable Insight: The Role of Big Data in Threat Detection

Java Developer's Journal - Thu, 07/31/2014 - 14:00
According to Gartner, Big Data refers to "high volume, high velocity, and/or high variety information assets” – and, this is the key – “that require new forms of processing to enable enhanced decision making, insight discovery and process optimization." While Big Data may seem like an invaluable tool that all security teams should try to leverage, it is not practical for everyone to attempt to harness it on their own. Finding insight from data is rarely as simple as it seems. We are still in the early stages of the Big Data revolution, with people only now beginning to understand what is possible, and what it takes to get there. Simply investing in tools and development is not enough. The fact is security teams are still struggling to identify and respond to incidents in an effective way. The Verizon Data Breach Investigations Report of 2013 noted that outside parties, whether it be a telecom provider, credit card issuer, third-party vendor or the FBI, were responsible for 70% of data breach notification, demonstrating that security teams are still missing the signs of detrimental threats that face organizations each and every day.

read more

Categories: Java, Media