February 03, 2013

Introduction to WebSockets
Chris Beams - a senior technical staff member at VMware and a core Spring Framework committer, Gunnar Hillert - a member of technical staff (MTS) at SpringSource and Rossen Stoyanchev - a Spring Framework developer make a thorough introduction to WebSockets and provide practical advice on using it in applications.


Creating a Simple Bloom Filter
You may have never heard of a bloom filter before but you've probably interacted with one at some point. For instance if you use Chrome, Chrome has a bloom filter of malicious URLs. When you visit a website it checks if that domain is in the filter. This prevents you from having to ping Google's servers every time you visit a website to check if it's malicious or not. Large databases such as Cassandra and Hadoop use bloom filters to see if it should do a large query or not.


Cloud computing law puts Canadian users at risk of snooping by American spies
In a report commissioned by the European Parliament, former Microsoft chief privacy adviser Caspar Bowden reveals, “it is lawful in the U.S. to conduct purely political surveillance on foreigners’ data accessible in U.S. clouds,” operated by U.S. firms such as Google, Microsoft, Apple, IBM and others. One sweeping provision of the Foreign Intelligence Surveillance Act (FISA) authorizes the targeting of, “foreign-based political organization(s)... or foreign territory that relates to... conduct of the foreign affairs of the United States.”


How Oracle Uses Big Data to Improve the Customer Experience
Customer experience management (CEM) programs are no stranger to the use of data. CEM professionals use data to gain insight about their customers to help improve the customer experience and optimize customer loyalty. Not surprisingly, CEM programs typically rely on customer feedback as their main data source (e.g., social media, customer emails, tech support notes, formal customer surveys). Customer feedback data, however, are only one type of business data that are used to improve business decisions.


Executive Insight: Breaking down the walls of the data centre
Martyn Warwick talks with John Dunne, the CTO of pioneering Irish start-up Intune, about how Software Defined Networks (SDN) will provide the means to simplify and control complex switches in the age of Big Data and will bring together the IT and telecoms worlds in ways never seen before.


5 ways to find your team's hidden talents
Even if you're leading an overqualfied crew, you're best served by trying to match people with work that requires as much of their brainpower as possible. Unchallenged workers are often unhappy workers, and unhappy workers leave when they get a better offer. Here are some ideas for finding and using your team's hidden talents.


The Big Data Challenge: 10 Tips for Telcos
The overall theory is that by extracting useful information from the information that is currently hidden and untapped in many systems and networks, CSPs can provide a better customer experience, develop more targeted and intelligent marketing programs and develop new business models that will ultimately enable them to maximize their top and bottom lines.


ASP.NET: Truly Understanding ViewState
Yet, here is a very good, in-depth article on ViewState that doesn't even mention it! Then there's this W3Schools article on ViewState that seems to indicate that posted form values are maintained via ViewState, but that's not true. (Don't believe me? Disable ViewState on that textbox in their example and run it again). And it's the #1 Google Search Result for "ASP.NET ViewState". Here is ASP.NET Documentation on MSDN that describes how Controls maintain state across postbacks. The documentation isn't wrong per say, but it makes a statement that isn't entirely correct


Breaking Down the Kinds of CIOs
According to the infographic below, there are five types of CIOs namely The Enforcer, The Mediator, The Evangelist, The Dinosaur and The Strategic Consultant. Take a look at the infographic which comes courtesy of Brogade to get a glimpse of the characteristics of each type as well the survival rating.


Four essentials of a good single sign-on strategy
Organizations implementing SSO, particularly to systems that hold sensitive data, should implement risk-appropriate authentication methods with the SSO system. Solutions aren't 'one size fits all' and solutions which provide SSO to all target systems may be deemed too expensive. Therefore, a best practice is to identify the tactical and strategic approaches that reduce enough of the problem space over time and within budget.


Sharing Code in WCF without Code Generation
The basic design pattern is so simple it is a wonder why the proxy generator even exists. (Well not entirely; proxy generation is still needed when consuming a non-WCF service.) As you can see, all you need to do is subclass ClientBase with the service interface you wish to implement and expose the Channel property. The constructors are recommended, but optional.


Quote for the day:

"Concentration comes out of a combination of confidence and hunger." -- Arnold Palmer

No comments:

Post a Comment