.net Professioanl:RBS(Tech Lead)

We have an urgent opening with one of our client Royal Bank of Scotland (Gurgaon).

Company Profile:

The Royal Bank of Scotland Group is one the world's largest financial institutions with over 36 million customers, around 135,000 staff worldwide and a selection of the world's most recognised financial brands - including NatWest Bank, Direct Line, Churchill, First Active, Ulster Bank, Coutts Group and Citizens Financial Group (USA).

The Royal Bank of Scotland Group has grown from small beginnings nearly 300 years ago to become one of the largest financial services groups in the world. RBS is one of the world's top 10 financial services groups and a leading provider of personal, business and institutional banking services. The Royal Bank of Scotland Group operates in more than 50 countries around the world to provide a range of retail and corporate banking, consumer finance, insurance and wealth management services

Position:Tech Lead

Location: Gurgaon

Experience:6-8yrs

Required Skill:C#,.Net, Sql server

Hands on working on web front ends, C#.NET, ASP.NET with experience in writing stored procedures in MS SQL Server
Experience of using MS SQL Server in order to build data warehouses and Analysis Services data cubes Experience in Oracle and Sybase will be an advantage.
Team leadership of a team with a proven delivery record



Finance domain Experience is an added advantage

If interested, please send your updated resume at ap@careeristindia.com along with the following mandatory details

Current and Expected C.T.C
Current location and preferred location.
Notice Period
2 References.


Regards,
Arpana
Careerist Management Consultants Pvt Ltd
New Delhi


SQL Server : dtswiz Utility

dtswiz utility starts the DTS Import/Export Wizard using command prompt options.

SQL Server : What is dtsrun Utility?

dtsrun utility executes a package created using Data Transformation
Services (DTS). The DTS package can be stored in the Microsoft SQL
Server msdb database, a COM-structured storage file, or SQL Server
Meta Data Services.

Examples

To execute a DTS package saved as a COM-structured storage file, use:

dtsrun /Ffilename /Npackage_name /Mpackage_password

To execute a DTS package saved in the SQL Server msdb database, use:

dtsrun /Sserver_name /Uuser_nName /Ppassword /Npackage_name /Mpackage_password

To execute a DTS package saved in Meta Data Services, use:

dtsrun /Sserver_name /Uuser_nrame /Ppassword /Npackage_name
/Mpackage_password /Rrepository_name

SQL Server : Displays backup and restore messages when backing up to or restoring from tape dump devices

The console command prompt utility displays backup and restore messages when backing up to or restoring from tape dump devices, and is used by the person responsible for backing up and restoring a database.
Syntax

console [/S server_name[\instance_name]] [/P pipe_name]

SQL Server : bcp Utility

Values in the data file being imported for computed or timestamp columns are ignored, and SQL Server 2000 automatically assigns values. If the data file does not contain values for the computed or timestamp columns in the table, use a format file to specify that the computed or timestamp columns in the table should be skipped when importing data; SQL Server automatically assigns values for the column.


Syntax

bcp {[[database_name.][owner].]{table_name | view_name} | "query"}
    {in | out | queryout | format} data_file
    [-m max_errors] [-f format_file] [-e err_file]
    [-F first_row] [-L last_row] [-b batch_size]
    [-n] [-c] [-w] [-N] [-V (60 | 65 | 70)] [-6]
    [-q] [-C code_page] [-t field_term] [-r row_term]
    [-i input_file] [-o output_file] [-a packet_size]
    [-S server_name[\instance_name]] [-U login_id] [-P password]
    [-T] [-v] [-R] [-k] [-E] [-h "hint [,...n]"]





Study in UK : Procedure for get Admission in MBA/Post Graduation

Application forms will require details on completed academic records from the respective institutions or universities in English. All details regarding stream of specialization, details of the course and subjects, details of credits etc have to be kept in a sealed envelope and attested by the registrar.

Test such as IELTS (International English Language Test) conducted by the British Council is mandatory for all international students seeking admission to any university in the UK. Alternately TOEFL scores are accepted by most of the universities, few universities waive these tests if they are convinced that the student's medium of instruction has been English throughout.

To procure admission into any management course, GMAT scores are very essential; GRE scores are not considered for postgraduate courses in the UK.

Any work experience, very relevant for a MBA degree has to be submitted.

A letter of reference, preferably from a person who has taught you in the subject that is related to the course you are applying for will be essential. The positive and negative aspects, strength and weakness of the student should be listed and the author should strongly speak on why and how the student would excel in this particular stream of study. This letter speaks volumes in securing admission for a foreign student seeking admission in the UK.

A statement of purpose (SOP) given by the student should clearly speak on why he has chosen a particular stream of academics and how he will manage financially during the academic stay in the UK.

European Business School London (EBSL) is a leading London business school

European Business School London is part of Regent's College

The European Business School London (EBSL) is a leading London business school, and the UK's oldest and largest private business school. We offer international business degrees incorporating languages, work experience and study abroad.

EBSL also offers specialist Masters and MBA programmes; including MA International Business, MA Human Resource Management, MA Entrepreneurial Management, MA International Marketing, MSc Global Banking and Finance and MBA International Business.

URL http://www.ebslondon.ac.uk/

Open Source :SPTWebMail

SPTWebMail is a web mail application with AJAX support that uses JavaMail.
Available at: https://sptwebmail.dev.java.net/

Open Source: send-only SMTP server

Aspirin is an embeddable send-only SMTP server that reuses parts of the Apache James mail server.
Available at: https://aspirin.dev.java.net/

Open Source :Mobile Agent 2.0

Allows users with any mobile email enabled device to access their files, open attachments, and forward mail on the go.
GPL License  at: http://www.phenomenatech.com

Open Source :Coadunation is a platform independent server implemented in Java

The latest version includes an Email Server, Web Mail Frontend, DNS Server, and Web Administration Console. Coadunation is an Open Source project provided under the GPL license and is available at: http://www.coadunation.net/

Open Source : JavaMail API

Jack Mail Client is a simple mail client that uses any mail server with minimal configuration. Jack Mail Client is written in pure Java and is available under the GPL license at: http://sourceforge.net/projects/jackmailclient

Open Source : Facebook API client implemented in Java

Wireless Networking : Native Wifi

The Native Wifi application programming interface (API) functions have two purposes: to manage wireless network profiles and to manage wireless network connections. The API elements are exposed by the Auto Configuration Module (ACM). The exposed connection and disconnection API elements can be used to override the automatic configuration logic.

Wireless Networking :IrDA

IrDA and Windows Sockets work together to support the implementation of easy-to-use, zero-configuration, point-to-point networking.

Explain CAPICOM?

CAPICOM is a ActiveX control that provides a COM interface to Microsoft CryptoAPI. It exposes a select set of CryptoAPI functions to enable application developers to easily incorporate digital signing and encryption functionality into their applications.

PC/SC Workgroup Members

PC/SC Workgroup Members

Bull CP8:
http://www.bull.com

Gemplus:
http://www.gemplus.com

Hewlett-Packard:
http://www.hp.com

IBM:
http://www.chipcard.ibm.com

Microsoft:
http://www.microsoft.com

Schlumberger:
http://www.slb.com

Siemens Nixdorf:
http://www.sni.de

Sun Microsystems:
http://www.sun.com

Toshiba:
http://www.toshiba.com

Verifone:
http://www.verifone.com

--------------------------------------------

ISO 7816, EMV, and GSM

The International Standards Organization (ISO) developed the ISO 7816 standards for integrated circuit cards with contacts. These specifications focused on interoperability at the physical, electrical, and data-link protocol levels. In 1996, Europay, MasterCard, and VISA (EMV) defined an industry-specific smart card specification that adopted the ISO 7816 standards and defined some additional data types and encoding rules for use by the financial services industry. The European telecommunications industry also embraced the ISO 7816 standards for their Global System for Mobile Communications (GSM) smart card specification to enable identification and authentication of mobile phone users.

While all of these specifications (ISO 7816, EMV, and GSM) were a step in the right direction, each was either too low-level or application-specific to gain broad industry support. Application interoperability issues, such as device-independent APIs, developer tools, and resource sharing were not addressed by any of these specifications.

Windows System Assessment Tool (WinSAT)

The Windows System Assessment Tool (WinSAT) assesses the performance characteristics and capabilities of a computer. Developers can use this API to develop software that can access the performance and capability information of a computer to determine the optimal application settings based on that computer's performance capabilities.

Users can use the results of a formal assessment to determine which scenarios and applications will perform well on a computer. For example, if a software package contains a rating on its packaging, a user can use the rating to determine whether the software will run well on the computer.

Download .NET Grid Dragging and Dropping DataGrid Columns


Download the ColumnDragDataGrid.msi file

Download Custom Windows Forms Controls: ColorPicker.NET

Download CustomWindowsFormsControls_ColorPicker.msi

Siebel Customer Relationship Management Applications

Lear about Oracle Siebel got to this side http://www.oracle.com/applications/crm/siebel/index.html

SQL Server 2005 : What's New in ADO 2.6

ADO MD CubeDef.GetSchemaObject Method
ADO MD objects can now be retrieved using unique names, as specified by the UniqueName property. The names of parent objects do not need to be known, and parent collections do not need to be populated to retrieve a schema object. See GetSchemaObject Method.

ADOX Group and User Properties

ADOX Group and User objects now surface a Properties collection, which can be populated with provider-specific properties. Specifically, the OLEDB:Trustee PIN property can be specified.

Command Streams
The Command object supports commands in stream format as an alternative to using the CommandText property. The CommandStream property can be used to specify XML Templates or updategrams as the Command input with the Microsoft OLE DB Provider for SQL Server.

Dialect Property
Dialect is a new property that defines the syntax and general rules that the provider uses to parse the string or stream.

Execute Method (ADO Command)
The Execute method of the Command object has been enhanced to use streams for input and output.

Field Status

Values If the user encounters a DB_E_ERRORSOCCURRED error when modifying a Field of a Recordset, ADO will now fill the Field.Status property with the appropriate status information so that the user will have more information about what went wrong. See Status Property (ADO Field).

NamedParameters Property
NamedParameters is a new property of the Command object that indicates that the provider should use named parameters.

Resultsets in Streams
ADO can return resultsets from a data source in a Stream, rather than a Recordset object. Using the latest version of the Microsoft OLE DB Provider for SQL Server, you can get XML results from the provider by executing a "For XML" query. A Stream that receives the resultset can be opened with a "For XML" command as the source.

Single Row Resultset
The ADO Record object can now be opened on a command string or Command object that returns one row of data from the provider. This results in improved performance with MDAC 2.6 providers.

SQL Server 2005 : RDS.DataControl

This object can automatically invoke the RDS.DataSpace and
RDSServer.DataFactory objects. Use this object to invoke the default
RDS data retrieval or update behavior.

This object also provides the means for visual controls to access the
returned Recordset object.

SQL Server 2005 : RDSServer.DataFactory

RDSServer.DataFactory This object represents the default server program. It executes the default RDS data retrieval and update behavior.

SQL Server 2005 : class ID for the RDS.DataSpace object

BD96C556-65A3-11D0-983A-00C04FC29E36.

DataSpace Object (RDS) RDS.DataSpace

Creates client-side proxies to custom business objects located on the middle tier.

Remote Data Service needs business object proxies so that client-side components can communicate with business objects located on the middle tier. Proxies facilitate the packaging, unpackaging, and transport (marshaling) of the application's Recordset data across process or
machine boundaries.

Remote Data Service uses the RDS.DataSpace object's CreateObject method to create business object proxies. The business object proxy is dynamically created whenever an instance of its middle-tier business object counterpart is created. Remote Data Service supports the following protocols: HTTP, HTTPS (HTTP Secure Sockets), DCOM, and in-process (client components and the business object reside on the same computer).

Basic RDS Programming Model

RDS addresses applications that exist in the following environment: A client application specifies a program that will execute on a server and the parameters required to return the desired information. The program invoked on the server gains access to the specified data source, retrieves the information, optionally processes the data, and then returns the resulting information to your client application in a form that it can easily use. RDS provides the means for you to perform the following sequence of actions:

  • Specify the program to be invoked on the server, and obtain a way to refer to it from the client. (This reference is sometimes called a proxy. It represents the remote server program. The client application will "call" the proxy as if it were a local program, but it actually invokes the remote server program.)
  • Invoke the server program. Pass parameters to the server program that identify the data source and the command to issue. (The server program actually uses ADO to gain access to the data source. ADO makes a connection with one of the given parameters, and then issues the command specified in the other parameter.)
  • The server program obtains a Recordset object from the data source. Optionally, the Recordset object is processed on the server.
  • The server program returns the final Recordset object to the client application.
  • On the client, the Recordset object is put into a form that can be easily used by visual controls.
  • Any modifications to the Recordset object are sent back to the server program, which uses them to update the data source.

SQL Server 2005 : Use of MDAC Version 2.6

The Microsoft Data Access Components (MDAC) SDK documents the key
technologies that enable Universal Data Access, Microsoft's strategy
for providing access to information across the enterprise.

Microsoft Data Access Components include ActiveX Data Objects (ADO),
OLE DB, and Open Database Connectivity (ODBC). Data-driven
client/server applications deployed over the Web or a LAN can use
these components to easily integrate information from a variety of
sources, both relational (SQL) and nonrelational.

The MDAC SDK is the primary source of information and instruction for
using data access technologies. Its tools, samples, and documentation
are designed to help developers create solutions for their data access
needs.

c# code : How to write value in windows registry

public bool WriteRegistry(string KeyName, object Value)
{
try
{
// Setting
RegistryKey rk = baseRegistryKey;
// I have to use CreateSubKey
// (create or open it if already exits),
// 'cause OpenSubKey open a subKey as read-only
RegistryKey sk1 = rk.CreateSubKey(subKey);
// Save the value
sk1.SetValue(KeyName.ToUpper(), Value);
return true;
}
catch (Exception e)
{
l
return false;
}
}
Please write your comments. above code is working or not

C# code : How to get value from windows registry

`public string ReadRegistry(string KeyName)
{
// Opening the registry key
RegistryKey rk = baseRegistryKey;
// Open a subKey as read-only
RegistryKey sk1 = rk.OpenSubKey(subKey);
// If the RegistrySubKey doesn't exist -> (null)
if (sk1 == null)
{
return null;
}
else
{
try
{
// If the RegistryKey exists I get its value
// or null is returned.
return (string)sk1.GetValue(KeyName.ToUpper());
}
catch (Exception e)
{

return null;
}
}
}

c# code : How to set windows service as auto start

public bool setAutoStartService(string ServiceName)
{
try
{
string subKey = "SYSTEM\\CurrentControlSet\\Services\\" + ServiceName;
// Setting
RegistryKey rk = baseRegistryKey;
// I have to use CreateSubKey
// (create or open it if already exits),
// 'cause OpenSubKey open a subKey as read-only
RegistryKey sk1 = rk.CreateSubKey(subKey);
// Save the value
sk1.SetValue("Start", (int)2);


}
catch (Exception e)
{

return false;
}
}

c# code : how to stop windows service

public void StopService(string ServiceName)
{
ServiceController sc = new ServiceController(ServiceName);
if (sc != null && sc.Status == ServiceControllerStatus.Running)
{

sc.Stop();
sc.WaitForStatus(ServiceControllerStatus.Stopped);

}
}

c# code : Start Windows service

public void StartService(string ServiceName)
{
ServiceController sc = new ServiceController(ServiceName);
if (sc != null && sc.Status == ServiceControllerStatus.Stopped)
{

sc.Start();
sc.WaitForStatus(ServiceControllerStatus.Running);

}
}

c# code : get created date time type metadata for a given filepath

///
/// Reads created date time type metadata for a given filepath
///

///
/// createdDatetime of the file
private string ReadCreationDateMetadata(string filepath)
{
string Filepath = filepath;
string FileName = Path.GetFileName(Filepath);
DateTime CreatedDateTime = File.GetCreationTime(Filepath);
string createdDatetime = string.Format("{0:R}", CreatedDateTime);
return createdDatetime;
}

Please write your comments

C# code : get content type metadata for a given filepath

///
/// Reads content type metadata for a given filepath
///

///
/// Content type of the file
private string ReadContentTypeMetadata(string filepath)
{
const string DefaultContentType = "application/unknown";

RegistryKey regkey = null;
RegistryKey fileextkey = null;
string filecontenttype = null;
string fileextension = null;

//the file extension to lookup
fileextension = Path.GetExtension(filepath);

try
{
//look in HKClassRoot in registry
regkey = Registry.ClassesRoot;
//look for extension
fileextkey = regkey.OpenSubKey(fileextension);
//retrieve Content Type value
filecontenttype = fileextkey.GetValue("Content Type", DefaultContentType).ToString();
//cleanup
fileextkey = null;
regkey = null;
}
catch
{
filecontenttype = DefaultContentType;
}
//string convertedMediatype = convertMediaType(filecontenttype);
return filecontenttype;
}

c# code : get filename metadata for a given filepath

///
/// Reads Filename metadata for a given filepath
///

///
/// File name
private string ReadFileNameMetadata(string filepath)
{
string FileName = Path.GetFileName(filepath);
return FileName;
}

get InnerText as Result of the selected tag

///
/// Returns the InnerText as Result of the selected tag
///

///
///
public string GetEntry(string param)
{
System.Xml.XmlDocument xmlDoc = new System.Xml.XmlDocument();
xmlDoc.Load(_configFile);
System.Xml.XmlNodeList xmlNodes = xmlDoc.SelectNodes(param);
if (xmlNodes.Count == 1)
{
return xmlNodes.Item(0).InnerText;
}
else
{
return null;
}
}

c# code get category form ini file

iniFileinfo.IniHelp ihelp = new iniFileinfo.IniHelp();

string iniFile="c://my.ini";
List<string> categories = ihelp.GetCategories(iniFile);
foreach (string category in categories)
{
Console.WriteLine(category);
}

Out put :-
serverpath
localpath


File my.ini [serverpath] files=solaris9 operator=mmas [localpath]

iniFileinfo.cs


using System;
using System.Collections.Generic;
using System.Text;

namespace iniFileinfo
{
using System;
using System.Runtime.InteropServices;
using System.Text;
class IniHelp
{
[DllImport("KERNEL32.DLL", EntryPoint = "GetPrivateProfileStringW", SetLastError = true, CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
private static extern int GetPrivateProfileString(
string lpAppName,
string lpKeyName,
string lpDefault,
string lpReturnString,
int nSize,
string lpFilename);
[DllImport("KERNEL32.DLL", EntryPoint = "WritePrivateProfileStringW", SetLastError = true, CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
private static extern int WritePrivateProfileString(
string lpAppName,
string lpKeyName,
string lpString,
string lpFilename);
public List<string> GetCategories(string iniFile)
{
string returnString = new string(' ', 65536);
GetPrivateProfileString(null, null, null, returnString, 65536, iniFile);
char[] sep = {'\0'};
List<string> result = new List<string>(returnString.Split(sep));
result.RemoveRange(result.Count - 2, 2);
return result;
}
public List<string> GetKeys(string iniFile, string category)
{
string returnString = new string(' ', 32768);
GetPrivateProfileString(category, null, null, returnString, 32768, iniFile);
char[] sep = { '\0' };
List<string> result = new List<string>(returnString.Split(sep));
result.RemoveRange(result.Count - 2, 2);
return result;
}
public string GetIniFileString(string iniFile, string category, string key, string defaultValue)
{
string returnString = new string(' ', 1024);
GetPrivateProfileString(category, key, defaultValue, returnString, 1024, iniFile);
char[] sep = { '\0' };
return returnString.Split(sep)[0];
}
}
}

C# code get all keys from ini file

iniFileinfo.IniHelp ihelp = new iniFileinfo.IniHelp();

string iniFile="c://my.ini";
List<string> categories = ihelp.GetCategories(iniFile);
List<string> keys = ihelp.GetKeys(iniFile, "serverpath");
foreach (string key in keys)
{
// here in key variable you can key value
console.writeline(key);
}

Out put :-
files
operator

File my.ini

[serverpath]
files=solaris9
operator=mmas

[localpath]


iniFileinfo.cs

using System;
using System.Collections.Generic;
using System.Text;

namespace iniFileinfo
{
using System;
using System.Runtime.InteropServices;
using System.Text;
class IniHelp
{
[DllImport("KERNEL32.DLL", EntryPoint = "GetPrivateProfileStringW", SetLastError = true, CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
private static extern int GetPrivateProfileString(
string lpAppName,
string lpKeyName,
string lpDefault,
string lpReturnString,
int nSize,
string lpFilename);
[DllImport("KERNEL32.DLL", EntryPoint = "WritePrivateProfileStringW", SetLastError = true, CharSet = CharSet.Unicode, ExactSpelling = true, CallingConvention = CallingConvention.StdCall)]
private static extern int WritePrivateProfileString(
string lpAppName,
string lpKeyName,
string lpString,
string lpFilename);
public List<string> GetCategories(string iniFile)
{
string returnString = new string(' ', 65536);
GetPrivateProfileString(null, null, null, returnString, 65536, iniFile);
char[] sep = {'\0'};
List<string> result = new List<string>(returnString.Split(sep));
result.RemoveRange(result.Count - 2, 2);
return result;
}
public List<string> GetKeys(string iniFile, string category)
{
string returnString = new string(' ', 32768);
GetPrivateProfileString(category, null, null, returnString, 32768, iniFile);
char[] sep = { '\0' };
List<string> result = new List<string>(returnString.Split(sep));
result.RemoveRange(result.Count - 2, 2);
return result;
}
public string GetIniFileString(string iniFile, string category, string key, string defaultValue)
{
string returnString = new string(' ', 1024);
GetPrivateProfileString(category, key, defaultValue, returnString, 1024, iniFile);
char[] sep = { '\0' };
return returnString.Split(sep)[0];
}
}
}

How to call the superclass constructor?

If a class called “SpecialClass1” extends your “Class1” class then you can
use the keyword “super” to invoke the superclass’s constructor. E.g.
public SpecialClass1(int id) {
super(id); //must be the very first statement in the constructor.
}
To call a regular method in the super class use: “super.myMethod( );”.

Java :Call one constructor from another?

Yes,
by using this() syntax. E.g.

public class1(int id) {
this.id = id; // “this” means this object
public class1 (int id, String type) {
this(id); // calls constructor public class1(int id)
this.type = type; // ”this” means this object

Jave :Whar are “static initializers” or “static blocks with no function names”?

When a class is loaded, all blocks that are declared static and don’t have function name (i.e. static initializers) are executed even before theconstructors are executed. As the name suggests they are typically used to initialize static fields.

public class StaticInitializer {
public static final int A = 5;
public static final int B; //note that it is not public static final int B = null;
//note that since B is final, it can be initialized only once.
//Static initializer block, which is executed only once when the class is loaded.
static {
if(A == 5)
B = 10;
else
B = 5;
public StaticInitializer(){} //constructor is called only after static initializer block

The following code gives an Output of A=5, B=10.

public class Test {
System.out.println("A =" + StaticInitializer.A + ", B =" + StaticInitializer.B);

Java : Explain static vs. dynamic class loading?

Static class loading
Classes are statically loaded with Java’s“new” operator.
class MyClass {
public static void main(String args[]) {
Car c = new Car();
}
}

Dynamic class loading
Dynamic loading is a technique for programmatically invoking the functions of a class loader at run time. Let us look at how to load classes dynamically.Class.forName (String className); //static method which returns a Class The above static method returns the class object associated with the class name. The string className can be supplied dynamically at run time. Unlike the static loading, the dynamic loading will decide whether to load the class Car or the class Jeep at runtime based on a properties file and/or other runtime conditions. Once the class is dynamically loaded the following method returns an instance of the loaded class. It’s just like creating a class object with noarguments.

class.newInstance (); //A non-static method, which creates an instance of a
//class (i.e. creates an object).

What are the usages of Java packages?

It helps resolve naming conflicts when different packages have classes with the same names. This also helps you organize files within your project. For example: java.io package do something related to I/O and java.net package do something to do with network and so on.

What is the difference between C++ and Java?

Both C++ and Java use similar syntax and are Object Oriented, but:Java does not support pointers. Pointers are inherently tricky to use and troublesome.

Java does not support multiple inheritances because it causes more problems than it solves. Instead Java supports multiple interface inheritance, which allows an object to inherit many method signatures from different interfaces with the condition that the inheriting object must implement those inherited methods. The multiple interface inheritance also allows an object to behave polymorphically on those methods.

Java does not support destructors but adds a finalize() method. Finalize methods are invoked by the garbage collector prior to reclaiming the memory occupied by the object, which has the finalize() method. This means you do not know when the objects are going to be finalized. Avoid using finalize() method to release nonmemory
resources like file handles, sockets, database connections etc because Java has only a finite number of these resources and you do not know when the garbage collection is going to kick in to release these resources through the finalize() method.

Java does not include structures or unions because the traditional data structures are implemented as an object oriented framework.

All the code in Java program is encapsulated within classes therefore Java does not have global variables or functions.
C++ requires explicit memory management, while Java includes automatic garbage collection.

WS-Security benefits/Feature

  • Serialization of security tokens to and from SOAP messages.
  • Authentication of security tokens.
  • Application and verification of message signatures.
  • Encryption and decryption of SOAP messages with ability to specify which parts of the message require encryption
  • Multiple types of token, e.g. SAML, X509, Kerberos
  • Message signing
  • End-to-end security
  • Supports many transport layers, not just HTTP

Timestamped SOAP message

<?xml version='1.0' encoding='UTF-8'?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
<soapenv:Header>
<wsse:Security
xmlns:wsse="http://docs.oasisopen.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd"
soapenv:mustUnderstand="1">
<wsu:Timestamp
xmlns:wsu="http://docs.oasisopen.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd"
su:Id="Timestamp-29987161">
<wsu:Created>2007-06-19T16:22:28.578Z</wsu:Created>
<wsu:Expires>2007-06-19T16:27:28.578Z</wsu:Expires>
</wsu:Timestamp>
</wsse:Security>
</soapenv:Header>
<soapenv:Body>
<cms:getNumberOfArticles xmlns:cms="http://daily-moon.com/cms">
<cms:category>cat1</cms:category>
</cms:getNumberOfArticles>
</soapenv:Body>
</soapenv:Envelope>

Adding a timestamp to the service

<service name="Service1">
<description>
This is a sample Web Service
</description>
<parameter name="ServiceClass" locked="false">CMSService</parameter>
<parameter name="InflowSecurity">
<action>
<items>Timestamp</items>
</action>
</parameter>
<parameter name="OutflowSecurity">
<action>
<items>Timestamp</items>
</action>
</parameter>
<operation name="getNumberOfArticles"> <messageReceiver
class="org.apache.axis2.receivers.RawXMLINOutMessageReceiver"/>
</operation>
</service>

Axis2 enables Frances to specifically control messages flowing both
into and out of the service. In this case, she's told the Web services
engine to require incoming messages to include a Timestamp, and to
include a Timestamp in the outgoing messages returned to the client.

Creating a key pair and keystore

>cd %JAVA_HOME%\bin
>keytool -genkey -keystore mykeys.jks -alias gene
Enter keystore password: mykeystorepassword
What is your first and last name?
[Unknown]: ABC
What is the name of your organizational unit?
[Unknown]: Information Technologies
What is the name of your organization?
[Unknown]: XYZ
What is the name of your City or Locality?
[Unknown]: New York
What is the name of your State or Province?
[Unknown]: NY
What is the two-letter country code for this unit?
[Unknown]: US
Is CN=Gene Telluride, OU=Information Technologies, O=The Daily
Moon,
L=New York, ST=NY, C=U
S correct?
[no]: yes
Enter key password for <gene>
(RETURN if same as keystore password): mypassword

What is Network Time Protocol (NTP)?

The Network Time Protocol (NTP) is a protocol for distributing the
universal time (UTC) by means of synchronizing the clocks of computer
systems over packet-switched, variable-latency data networks. NTP uses
UDP port 123 as its transport layer. It is designed particularly to
resist the effects of variable latency by using a jitter buffer.

What is Marshalling ?

Marshalling (similar to serialization) is the process of transforming the memory representation of an object to a data format suitable for storage or transmission. It is typically used when data must be moved between different parts of a computer program or from one program to another.

What is Distributed Transaction Coordinator (MSDTC) ?

The Distributed Transaction Coordinator (MSDTC) service is a component
of modern versions of Microsoft Windows that is responsible for
coordinating transactions that span multiple resource managers, such
as databases, message queues, and file systems. MSDTC is included in
Windows 2000 and later operating systems

What is Microsoft Message Queuing (MSMQ )?

MSMQ is essentially a messaging protocol that allows applications running on disparate servers to communicate in a failsafe manner. A queue is a temporary storage location from which messages can be sent when conditions permit. This enables communication across heterogeneous networks and between computers which may not always be connected.

Flex 3 new features

Native support for Adobe AIR – Flex 3 introduces new components and incorporates the Adobe AIR development tools into the SDK and Flex Builder.
Persistent framework caching
– You can make Flex 3 applications as small as 50K when leveraging the new Flash Player cache for Adobe platform components.
Flex Builder productivity enhancements – Flex Builder 3 introduces refactoring support, new profilers for performance and memory tuning, and code generation tools for data access.
Integration with Creative Suite 3 – The Flex Component Kit for Flash CS3 allows Flash CS3 users to build components that can be seamlessly integrated into a Flex application, while Flex Builder 3 adds new wizards for importing assets from CS3 applications as skins.
Advanced DataGrid – The Advanced DataGrid is a new component that adds commonly requested features to the DataGrid such as support for hierarchical data, and basic pivot table functionality.
First steps toward open source Flex. As a first step toward making Flex an open source project, we've opened up the Flex and Flex Builder bug tracking system to the public, as well as published detailed roadmap information.

Flash Flex 3 :SpringGraph amazing tree visualization tool

Mark Shepherd has put together an amazing tree visualization tool called SpringGraph (http://mark-shepherd.com/Spring Graph/).

Flash Flex 3 :Distortion Effects

Alex Uhlmann (http://alex-uhlmann.de/flash/animationpack age/) has developed a set of distortion effects to supplement the effects provided in the Flex core.

Flash Flex 3 :FlexLib Project

The FlexLib Project (http://flexlib.googlecode.com/) is an open source set of containers, controls, and classes to which you are free to contribute. The FlexLib Project comprises a wide variety of controls, including a horizontal accordion, advanced sliders and tab bars, and enhanced tree controls, among others.

Flex 3 :Advanced Flash Components

Flex is built on top of Flash, so you can use Flash components in your Flex application directly. This allows you to use a wide variety of off-the-shelf Flash components, including the Flash components available from Advanced Flash Components (AFC; http://www.afcomponents.com/).

Flash Flex Builder : ILOG Elixir

ILOG Visualization Products has developed a set of extremely powerful data visualization controls designed specifically for Flex. The ILOG Elixir toolkit (http://www.ilog.com/products/
elixir/) contains a complete set of 2D and 3D graph types, all of which allow you to create effects-based transitions that will make you look like a superstar. Included in the toolkit are
ready-to-use schedule displays, map displays, dials, gauges, 3D and radar charts, Gantt charts, a treemap chart, and organization charts.

JSP : Life Cycle of a Servlet

The javax.servlet.Servlet interface defines the methods that all servlets must implement and among others, three methods that are known as life-cycle methods:

public void init(ServletConfig config) throws ServletException
public void service(ServletRequest req, ServletResponse res) throws ServletException, IOException
public void destroy()

These life-cycle methods are each called at separate times during the lifespan of a servlet, from the initial creation to the moment it's removed from service and destroyed. These methods are called in the following order:

1. When the servlet is constructed, it is initialized with the init() method.
2. Any requests from clients are handled initially by the service() method before delegating to the doXxx() methods in the case of an HttpServlet. This method is responsible for processing the request and returning the response.
3. When the servlet needs to be removed from service, it's destroyed with the destroy() method, then garbage collected and finalized. When the container decides to take a servlet out of service it first ensures that any service() method calls have completed.

JSP :ServletInputStream and ServletOutputStream abstract classes

The ServletInputStream and ServletOutputStream abstract classes provide the ability to read and write binary data from and to the client. Implementations of these classes must provide an implementation of the java.io.InputStream.read() and java.io.OutputStream.write() methods, respectively.

JSP : GenericServlet abstract class

The GenericServlet abstract class can be used to develop protocol-independent servlets and requires only that subclasses implement its service() method.

JSP : javax.servlet Interfaces

The javax.servlet package is composed of twelve interfaces. The web container implements seven of these interfaces as follows:
ServletContext
ServletConfig
ServletResponse
ServletRequest
RequestDispatcher
FilterChain
FilterConfig

CodeProject Newsletter (28 Jul 2008)

Edit Controls
  • Password Strength Control - Tharindu Nishad Patikirikorala
    This article is about a Password Strength control, which can be used in password dialogs and login windows in Windows based .NET applications. If you want, you can use it as a progress bar control as well. This control can be shaped to different styles and can be extended, if needed.
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 2.0), Dev, Design, Intermediate

Files and Folders

  • Generate PDF Using C# - Predrag Tomasevic
    Using OpenOffice to convert different document types to PDF. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows, .NET (.NET, .NET 3.5)VS2008, Dev, Intermediate

Printing

  • Printing of DataGridView - Life with .NET
    This article will print all the records in a datagridview in tabular form (Unedited)
    C# (C# 2.0, C#), Windows (Windows, Win2003), .NET (.NET, .NET 2.0), ADO.NET, Visual Studio (VS.NET2002, Visual Studio), Architect, Dev, Beginner, Intermediate

Ajax and Atlas

  • Persistent Splitter control in Visual WebGui - Bogdan Zamfir
    Implementing a Persistent Splitter control in Visual WebGui (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 3.5, .NET 1.1, .NET 2.0), Visual Studio (VS.NET2003, VS2005, VS2008, Visual Studio), ASP.NET, Ajax, Dev, Intermediate

ASP.NET

  • A Practical Example Of Using The New Features Of ASP.NET 3.5 - Mike Borozdin
    Tutorial on using LINQ, ListView, LinqDataSource, DataPager, ASP.NET AJAX (Unedited)
    Javascript, HTML, XHTML, .NET (.NET 3.5, .NET), ASP.NET, SQL Server (SQL Server, SQL 2005), Visual Studio (Visual Studio, VS2008), Ajax, Intermediate

  • Excecute SSIS package (DTSX) from ASP.Net - santosh poojari
    This article demonstrate the step by step procedure to create SSIS Package and Execute the same using ASP.net (Unedited)
    C#, .NET (.NET 3.0, .NET 3.5, .NET 1.0, .NET 1.1, .NET 2.0, .NET), SQL Server (SQL Server, SQL 2005), ASP.NET, Design, Intermediate, Advanced

  • Integrating ASP.NET and ActionScript 3.0 through XML - sadekz
    Step by step: Building a dynamic news application with ASP.NET and Flash CS3.
    XML, C# (C# 2.0, C#), .NET (.NET, .NET 2.0), Flash, ASP.NET, Dev, Intermediate, Advanced

  • Multi-Connected Consumer Web Parts - Mark Trudgeon
    Allow consumer web parts to have multiple providers in ASP.NET, WSS 3.0 and MOSS 2007 (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows (Windows, Win2K, WinXP, Win2003, Vista), .NET (.NET, .NET 2.0), Visual Studio (VS2008, Visual Studio), ASP.NET, Dev, Intermediate

Client side scripting

HTML / CSS

Internet / Network

  • NAT Traversal with UPnP in C# - harold aptroot
    NAT Traversal with UPnP in C#, without any libraries (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 2.0), Dev, Intermediate

Silverlight

Web Services

Office Development

SharePoint Server

Database

.NET Framework

  • DisplayNameAttribute for Enumerations - MikeCS
    An article about the creation of a DisplayNameAttribute for fields of enumerations in .NET which value will be display in a PropertyGrid.
    C# (C# 2.0, C#), .NET (.NET, .NET 3.0), Dev, Intermediate

  • Typed DataSets in practice - Tuomas Hietanen
    A practical guide to use the DataSet class (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET CF, .NET (.NET, .NET 3.5), ADO, ADO.NET, Dev, Beginner, Intermediate

  • Global Mouse and Keyboard Library - CodeSummoner
    Easy-to-use library with global mouse and keyboard hooks and simulators. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 3.5, .NET 3.0, .NET 1.1, .NET 2.0), Win32, Beginner, Intermediate

Libraries

LINQ

Windows Communication Foundation

  • WCF: Quick Tour - John Nabil
    Illustrating in brief how to make small and complete application with WCF (Unedited)
    C#, .NET, WCF, Beginner

Windows Presentation Foundation

  • An Animated "AlarmBar" Custom Control in WPF - AndyL2
    Published WPF resources discussing control customization focus almost exclusively on editing local copies of ControlTemplates, while implementing and interacting with an actual Custom Control library requires a DIFFERENT set of techniques and reference syntax to be used (Unedited)
    C# (C# 3.0, C#), .NET (.NET, .NET 3.0, .NET 3.5), XAML, WPF, Dev, Intermediate, Advanced

  • A WPF Pie Chart with Data Binding support - Colin Eberhardt
    This article describes the development of an interactive pie chart which uses data binding. (Unedited)
    C# (C# 3.0, C#), .NET (.NET, .NET 3.5), WPF, Dev, Intermediate

  • Using converters to aggregate a list in a ListView - Timmy Kokke
    Explanation on how to use converters to calculate the sum, largest, average, etc., of the items in a ListView.
    C# (C# 3.0, C#), .NET (.NET, .NET 3.5, .NET 3.0), WPF, Dev, Intermediate, Advanced

  • How to place all WPF commands and related events centrally in a static class - Yogesh Jagota
    This class tell you how to place all WPF commands and their related CanExecute and Executed events centrally in a static class (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 3.5), WPF, Dev, Intermediate

  • Using RoutedCommands with a ViewModel in WPF - Josh Smith
    Reviews a clean and lightweight way to use RoutedCommands in the MVVM pattern (Unedited)
    C# (C# 3.0, C#), .NET (.NET, .NET 3.5), XAML, WPF, Architect, Dev, Intermediate

  • Extending WPF Commands - Patrick Klug
    How to overcome the limitations of the WPF Command system. (Unedited)
    C# (C# 2.0, C# 3.0, C#), .NET (.NET, .NET 3.5, .NET 3.0), WPF, Architect, Dev, Intermediate

  • WPF UserControl == DataTemplate!!! - Jammer
    Demos how to use a WPF UserControl as a DataTemplate (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), WPF, Intermediate

C / C++ Language

  • 32 OpenMP traps for C++ developers - Karpov Andrey
    The article contains description of a number of errors, which lead to incorrect behavior of parallel programs created with OpenMP (Unedited)
    C++ (VC6, VC7, VC7.1, VC8.0, C++), C++/CLI, C, Advanced

C#

  • Track File Activites - Biswas, Sumit
    It helps to track/monitor file activites using FileSystemWatcher and maintains log, which can be viewed using various filter options. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows (Windows, WinXP), Win32, Dev, Intermediate

Java

  • Serializing Java objects to XML with WOX - Carlos Jaimez
    This article explains how to use WOX to serialize Java objects to XML. One of its main features is the generation of standard XML, which is language independant. (Unedited)
    XML, Java, Windows, Architect, Dev, Intermediate

VB.NET

  • Zip Files Easy! - VB Rocks
    The purpose of this article is to demonstrating zipping files using the ZipPackage class in this System.IO.Packaging namespace. This demonstration uses: VB.Net 2008 .Net, Framwork 3.0. (Unedited)
    VB (VB 9.0, VB), Windows (Windows, WinXP, Vista), Visual Studio (VS2008, Visual Studio), Dev, Intermediate

  • Screen Capture Class - VBDT
    The SCapture class allows an application to capture still screen images (Unedited)
    VB (VB 8.0, VB), .NET (.NET, .NET 2.0), Visual Studio (VS2005, Visual Studio), Dev, Intermediate

Algorithms & Recipes

  • Universal Framework for Science and Engineering - Part 11: CodeDom Optimizing Compiler - Petr Ivankov
    CodeDom Optimizing Compiler for Science and Engineering (Unedited)
    C# (C# 3.0, C#), Windows (Windows, WinXP, Win2003, Vista), .NET (.NET, .NET 3.5, .NET 3.0), Win32, Win64, OpenGL, Architect, Design, Intermediate, Advanced

  • Data Caching - Dmitry Zubrilin
    Unified algorithm for caching data retrieved from backend repository. (Unedited)
    C# (C# 2.0, C#), Intermediate

  • Configuration Management - Dmitry Zubrilin
    This article shows how to store/handle configuration settings in a config file and backend database. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#)

  • A Simple HTML Token Parser - ScottRosin
    A very simple HTML template parser which replaces user-defined tokens with meaningful text.
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 2.0), ASP.NET, Dev, Intermediate

Threads, Processes & IPC

  • Thread Proxy Mediator Pattern - Michael Birken
    The Thread Proxy Mediator Pattern (TPMP) is a behavioral design pattern that solves many of the problems that plague GUI developers.
    C#, WPF, Dev, Intermediate

Code Generation

  • Tier Generator 1.0 - Shakeel Iqbal
    A powerful tool for the rapid development. (Unedited)
    C# (C# 2.0, C#), Windows (Windows, WinXP), .NET (.NET, .NET 2.0), SQL Server (SQL 2005, SQL Server), Intermediate

Debug Tips

Product Showcase

  • Inside xamSalesManager: a NetAdvantage for WPF Showcase Sample - Infragistics Community
    Infragistics dives deep into the technical architecture of their xamSalesManager showcase sample for WPF. Read how you can apply the Model - View - ViewModel pattern to your own application designs to create compelling user experiences like in this sophisticated sales dashboard.
    C#, XML, .NET, Visual Studio, WPF, Design, Architect, Dev, Intermediate

  • ThinDoc: Zero-Footprint, Full-Screen PDF Viewer - Jacob Lauzier
    PDFs are probably the most popular digital document exchange format on the planet. ThinDoc simplifies things by providing a Zero-Footprint PDF Viewer allowing you to view PDFs without downloading them.
    Javascript, CSS, C#, .NET, Visual Studio, ASP.NET, Sales, Marketing, CEO, Architect, Dev, Intermediate

  • Get this Cookbook and Go Deep with the Force.com Platform - developer.force.com Team
    Created by leading engineers on the Force.com platform R&D team, this no-cost Cookbook is loaded with Java, .NET and PHP code "recipes" that provide expert methods, patterns, and solutions for building on-demand apps.
    Java, .NET, PHP, SysAdmin, Architect, Dev, Intermediate

Articles updated added Last week

Dialogs and Windows

  • Advanced message box for .NET - Sergey Stoyan
    A replacement of .NET MessageBox class that provides additional features and improvements like possibility to show any number of buttons, 'apply-my-answer-by-default' checkbox, intelligence layout and more. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows (Windows, NT4, Win2K, WinXP, Win2003), .NET (.NET, .NET 3.5, .NET 3.0, .NET 1.0, .NET 1.1, .NET 2.0), Win32, Visual Studio (VS2005, Visual Studio), Intermediate

Edit Controls

  • CueProvider - Ravi Bhavnani
    A lightweight class that lets you add cues to a TextBox. (Unedited)
    C#, .NET, Dev, Beginner

List Controls

  • A Much Easier to Use ListView - Phillip Piper
    This article describes a much easier to use ListView that supports sorting and grouping.
    C# 2.0, Windows, .NET 2.0VS.NET2003, VS2005, Dev, Intermediate

Miscellaneous

  • Notification Bar - Cory Borrow
    A small & easy to use notification bar like that found in IE6+ and Firefox web browsers. (Unedited)
    C# (C# 2.0, C#), Windows (Windows, Win2K, WinXP, Win2003, Vista), .NET (.NET, .NET 2.0, Mono), Dev, Beginner

ASP.NET

Client side scripting

  • JavaScript ListBox Control - SAMir Nigam
    This article describes how to create a ListBox control using JavaScript. (Unedited)
    C# (C# 2.0, C#), Javascript, CSS, HTML, XHTML, .NET (.NET, .NET 2.0), ASP.NET, Ajax, Dev, Intermediate

Validation

Office Development

  • A Very Easy to Use Excel XML Import-Export Library - Yogesh Jagota
    Import export library for Excel XML Format, which reduces a programmer's work to the bare minimum (Unedited)
    C++/CLI, C# (C# 1.0, C# 2.0, C# 3.0, C#), VB, .NET (.NET, .NET 2.0, .NET 3.5, .NET 3.0), Intermediate

  • Generating Word Reports / Documents - Predrag Tomasevic
    Generate Word documents by appling XSLT on XML data.
    XML, SQL, HTML, XSLT, C# 2.0, Windows, .NET 2.0SQL 2005, VS2005, DBA, Dev, Intermediate

Audio and Video

GDI+

  • Marching Ants - Hax0r778
    Learn how to create marching ants easily and efficiently.
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows, GDI+, Dev, Intermediate

Database

SQL Reporting Services

LINQ

Windows Presentation Foundation

  • A WatermarkTextBox in 3 lines of XAML - AndyL2
    Another example of how Xaml can solve issues that most developers automatically assume will require "coding". (Unedited)
    C# (C# 3.0, C#), .NET (.NET, .NET 3.0, .NET 3.5), XAML, WPF, Design, Dev, Beginner, Intermediate

C#

  • Learn Visual Studio & Visual C# - Part4 - Code24.com
    Using some Windows components from the toolbox (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), Windows (Windows, WinXP, Vista), Visual Studio (VS2005, Visual Studio), Architect, Intermediate

  • Dynamic Screen Resolution - sreejith ss nair
    Setting the Screen Resolution in C#
    C#, Windows, .NET 1.0VS.NET2002, Dev, Intermediate

  • Generating MD5 hash out of C# objects - Hasler Thomas
    This article describes how to generate the MD5 hash string for a common C# object. (Unedited)
    C# 2.0.NET 2.0, WinXPVS2005, Dev, Intermediate

  • C# Script: The Missing Puzzle Piece - Oleg Shilo
    An article on a "scripting engine" for the C# language
    C#, Windows, .NET 1.1, .NET 2.0VS.NET2003, VS2005, Dev, Intermediate

Algorithms & Recipes

  • An Addition to Smart List classes - Nelek
    This article presents the code of Simon Hughes' SmartList with some new functions
    C++, Windows, Visual Studio, MFC, Dev, Intermediate

  • General Expression Parser and Evaluator - WBurgMo
    A user configurable expression parser and evaluator (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 2.0), Visual Studio (VS2005, Visual Studio), Dev, Intermediate

  • XML: Include a Flexible Parser in Your C++ Applications - Michael Chourdakis
    Free, portable, compiler-independent XML library in C++
    C++, XML, Windows, Visual Studio, Dev, Intermediate

  • Email address validation using regular expression. - Mykola Dobrochynskyy
    This article discuss the topic of validation of an Email address with the regular expressions, and finally presents C# working example project. (Unedited)
    C# (C# 1.0, C# 2.0, C# 3.0, C#), .NET (.NET, .NET 3.5, .NET 3.0, .NET 1.0, .NET 1.1, .NET 2.0), Architect, DBA, Dev, Intermediate, Advanced

Cryptography & Security

  • AxiomaticTokenizer - GeorgeHara
    Financial security with one-time tokens (Unedited)
    Javascript, HTML, Intermediate, Advanced

Threads, Processes & IPC

  • RCF - Interprocess Communication for C++ - Jarl Lindrud
    A server/client IPC Framework, using the C++ preprocessor as an IDL compiler
    C++ (VC7.1, C++), C++/CLI, Windows (Windows, Win2K, WinXP), Visual Studio (VS.NET2003, Visual Studio), Dev, Intermediate

Design and Architecture

  • Modeling Enterprise Applications with Entity Framework - Fakher Halim
    An article on leveraging Entity Framework to create a set of inherited business objects from a single table. Writing code without any conditionals! (Unedited)
    C# (C# 3.0, C#), VB (VB 9.0, VB), .NET (.NET, .NET 3.5), Visual Studio (VS2008, Visual Studio), ADO.NET, LINQ, Design, Architect, Dev, Intermediate, Advanced

  • Authentication in web services using C# and Kerberos (POC) - Akrumooz
    This article is considered a proof of concept article (POC) to explain how Kerberos authentication can be implemented to authenticate requesters when they need to request a web service. (Unedited)
    C#, .NET, IIS, Visual Studio, Architect, Dev, Intermediate, Advanced

Hardware & System

  • Virtual Desktop: A Simple Desktop Management Tool - Malli_S
    This article gives you an overview of Windows Station, Windows Desktop and how to work with them. It also has a sample application (Virtual Desktop) demonstrating multiple desktop management.
    C++, Windows, Visual Studio, Dev, Intermediate

JSP : exception object

Exception object is only available to those JSP pages that declare themselves as error pages
using the following page directive
<%@ page isErrorPage="true" %>

JSP : config object

The config object simply provides the JSP developer with access to the ServletConfig object that is used by the web container to configure the JSP and its implementation servlet. The ServletConfig interface is most commonly used to provide access to any initialization parameters that have been configured for either the JSP or its implementation servlet via the deployment descriptor of the web application.

JSP : out object

The implicit out object represents an instance of the javax.servlet.jsp.JspWriter class that can be used to write character data to the response stream in a similar manner to that seen by the java.io.PrintWriter class.

JSP : Instance of the javax.servlet.http.HttpServletResponse interface

response object

JSP Request Object

The request object provides access to all of the available information about the user request such as request parameters and headers and may be used in exactly the same way as the HttpServletRequest parameter is used in the service() method of a normal servlet.

which is an instance of the javax.servlet.http.ServletRequest interface

request object

JSP request Syntax

<html>
<head><title>A Simple Example</title></head>
<body>
<h2>Hello<%=request.getParameter("userName")%>, Have a nice day!</h2>
</body>
</html>

JSP Page : Expression Language Expressions

JSP 2.0, for the first time, introduces an EL based on both ECMAScript and XPath, which has been designed to be simple to use and more user-friendly than Java.

The new EL has built-in support for JavaBean access and manipulation, collections of objects, and automatic type conversion to name but a small part of its extensive feature list. If you're familiar with JavaScript you should have no problem understanding the syntax of the EL, which insists that all expressions must be enclosed within ${ and } delimiters.

JSP Page :Template Text

Any non-JSP code located inside a JSP page is known as template text. Template text can take any form aslong as it's text based. The most common form of template text is markup such as HTML or XML. For example, if your web design team was to develop an HTML page that you were required to convert into aJSP page in order to add some form of dynamic processing, then all of the HTML markup would be referred to as template text:

<%@ taglib uri="http://java.sun.com/jstl/core" prefix="c" %>
<%@ page import="com.Calendar"%>
<html>
<head>
<title>My HTML Example</title>
</head>
<body>
<jsp:useBean id="cal" class="com.Calendar"/>
<c:set var="hour" value="${cal.hour}" scope="request" />
<c:choose>
<c:when test="${hour > 0 && hour <=11}">
Good Morning!
</c:when>
<c:when test="${hour >= 12 && hour <=17}">
Good Afternoon!
</c:when>
<c:otherwise>
Good Evening!
</c:otherwise>
</c:choose
</body>
</html>

JSP Page : Security Problems

As each JSP page is responsible for handling all of its processing, it's possible that any actions that require a user to be logged in or that access password-protected resources such as databases, could end up exposing sensitive information by embedding it in the page. It's therefore important to make sure that any such logic is encapsulated into JavaBean components or custom actions to prevent this possible security hole.


JSP Page : Reusability Problems

When most of the processing logic is embedded into the JSP pages, it becomes much more difficult to reuse common functionality because it's usually implemented using scriptlets. Often this results in a lot of cutting and pasting of code that isn't only bad from a reusability perspective but is also likely to introduce errors and decrease productivity.

JSP Page Maintainability Problems

Because each JSP page is solely responsible for handling a client request, it will often have to directly interact with a business layer. This can result in the application structure being embodied within the pages themselves. This obviously makes the pages more complicated and more likely to contain lots of scriptlet code, which ultimately makes them far harder to maintain.

JSP : Readability

Embedding too much Java code in the page can easily lead to pages that are unreadable as content (typically HTML) is mixed with JSP tags and Java code wrapped up as scriptlets. In addition to the confusion caused by the various syntaxes that each of these "languages" uses, one clear problem with embedding Java code inside JSP pages is that it's hard to correctly indent your source code. Writing and indenting code is trivial when dealing with regular class files, but trying to correctly indent Java code that is mixed up with HTML and JSP is a different story.

What does it take to succeed in a role like this?

This question will help you achieve two things. First, it will help you understand the standards your boss expects you to meet. Second, you will come across as someone who is keen on succeeding. You must also ask how success is measures in the team as it depends on a boss's managerial style. For instance, if it's a sales oriented position, will you be rewarded only for exceeding sales, or are there rewards for customer satisfaction, teamwork etc? Try and get specific answers from the employer, as this will be an indication of where you should focus your energies if you intend to take up the job.

What are your key expectations from team members?

Often, as an answer to this question, most supervisors start by describing traits demonstrated by their favourite employees in the team. This can be a great clue to understanding what it is going to take to get into your boss's good books. If your boss-to-be says he wants team members to take initiative and perform independently, you know he is not going to micromanage and breathe down your neck everyday. If he says that they expect team members to 'go the extra mile' and work hard, you will spoil your impression by trying to sneak out of office early every day.

Student Visa : certain tips on how to face the interview successfully

If you do not have your Bachelor's degree, a course completion certificate along with mark sheets and transcripts will be sufficient at the time of the US visa interview. Prepare an Asset Statement showing the division of Movable Assets, Immovable Assets and Family Income. Include the totals available to you from all family sources (immediate family). You will be required to show that you can pay for your complete expenses for education and living. Please also carry your admit and reject letters and your entrance test score sheets. Be confident and honest during the interview. Research the course that you have applied for well before you go for the interview. For more information on the US visa you can log on to www.vfs-usa.co.in.

MS in Biomedical Signal processing in US: How much CGPA, ToFEL, and GRE score required to apply, in any university in USA, not necessary Top 25 universities.

Most schools in the US require the GRE and TOEFL scores for admission to a Master's degree programme along with 16 years of undergraduate education. Universities consider various factors such as prior academics, entrance test scores, additional activities, application essays, and so on while reviewing an application. A score of 1300 and above (out of 1600) is a good score in the GRE. In the TOEFL IBT, 100 points (out of 120) and above is considered a good score. Also try to maintain your academics above a first class.

MBA in the US :What is the minimum score required in GMAT in order to get into good B schools?

Most 'top' B schools require the GMAT and TOEFL score along with at least 2-3 years of work experience. Universities consider various factors such as prior academics, entrance test scores, additional activities, application essays, growth pattern at work and so on while reviewing an application. A score of 680 and above (out of 800) is a good score in the GMAT.

Studying in the UK : Question ans Answer : FAQ

Q:- i have done MCA(Masters in Computer Applications) from an open university through correspondence mode am i eligible to study in UK. If so what course is best for me .

Ans yes you are eligible to apply, but we do not offer advice on which colleges you may wish to join.


Q  i had already get refused on the basis of experience verification so can i apply again
Ans, you are free to re-apply at anytime


which is the best pilot training institute/school in uk?

Ans
www.tqi.ac.uk  


Q what is the name of the visa issued for education ?

Ans student visa


IQ i want to study in UK. What is procture.Can u explain pls And what is the fee?
Ans :How do I make my application? Whenever possible, we aim to make a decision on your application without interview. Since the introduction of biometrics on 12 December 2007, we make most decisions on non-settlement applications in approximately 4 working days of receiving the papers. If the entry clearance officer decides that an interview is necessary, then your application will take a little longer. Please allow enough time for us to process your application, preferably 4-6 weeks, and remember that at busy times of the year, it may take slightly longer for us to make a decision about your application. We recommend that you do not buy your ticket before we have issued your visa. What sort of documents do I have to show? Everyone's circumstances are different. This is why we do not ask for a set list of documents. Student Fees Rs 8415


Q, I have got offers for doing an M.B.A from some universities in UK, but I am not sure of their ranking because every management school has been given different ranking in different websites. Can you please give me any OFFICIAL OR MOST AUTHENTIC website, which can provide me the official ranking of UK universities? Secondly, if I join HSMP MBA programme in UK, then will this be helpful in getting IMMIGRATION to UK?

Ans try
www.tqi.ac.uk  for ranking. there is no such category as HSMP MBA. www.ukvisas.gov.uk verifies this.


Q what is the minimum qualification for taking admission in U.K. for any course
Ans Thats for your prospective Edudation Provider to assess


Q I have got unconditional offer from kings college london for m.sc pharmacology programme.i wish to go for my ph.d ther it self.so how can i apply for ph.d in uk.
Ans check with the international officer at KCL


Q,Name one reason why one should study in the UK and not Australia?
Ans, Build on the close education ties between India and the UK Internationally recognised high standards of education Exchange of new ideas, attitudes and experiences Understanding international life, culture and values Post-graduate opportunities to work in the UK

Oracle JDeveloper 10.1.3.3 Documentation

Oracle IOT KEY FEATURES

KEY FEATURES  Table Functionality

CREATE TABLE AS SELECT
ALTER TABLE OPTIONS
Logical ROWID support
Secondary Index
LOB columns
Constraints
Triggers
Horizontal partitioning
Distributed database and replication support
NEW! Extensible Indexing support
IMPORT/EXPORT
SQL Loader support
Conventional
Direct Path
Object Support
Object Type
VARRAYS
Nested Tables
REF columns

Oracle 9i Index-Organized Tables IOT

An Index-Organized Table (IOT) is a unique storage organization feature of the Oracle9i server that provides added value in performance, scalability, and availability over conventional tables.  The actual data for an index-organized table is stored in B-tree index leaves in sorted order based on the table's primary key so that changes to that data, such as adding, updating, or deleting rows, require an update t o the index only.  This approach enables extremely fast access to table data for primary key based queries, making index-organized tables ideal for a wide variety of applications. 

new feature in ADO.NET version 2.0 :SqlBulkCopy

ADO.NET (ActiveX Data Object) is a set of classes used for data access in .NET. ADO allows .NET programmers to access a database without even

knowing how the database has been implemented. It is a part of base class library that is included with the Microsoft .NET Framework.
The simplest and fastest way of copying a large amount of data from different sources to an SQL Server table can be accomplished with the help of Bulk Copy Operation, a new feature in ADO.NET version 2.0.

Here different sources of data are those from which data can be loaded into 'DataTable' instance or read with 'IDataReader' instance. To accomplish bulk copy one has to use 'SqlBulkCopy' class that is present in 'Sytem.Data.SqlClient' namespace in .NET framework. Now using this 'SqlBulkCopy' class one can perform single bulk copy, multiple bulk copy and bulk copy with a transaction.

using System.Data.SqlClient;
string connectionString = "Data Source=.;Initial Catalog=NTL;User ID=sa;Password=P@ssw0rd";
SqlConnection sourceConnection = new SqlConnection(connectionString);
sourceConnection.Open();

SqlCommand commandSourceData = new SqlCommand("SELECT * FROM Source;", sourceConnection);
SqlDataReader reader = commandSourceData.ExecuteReader();
Connect to a destination table of data using:
SqlConnection destinationConnection = new SqlConnection(connectionString);
destinationConnection.Open();

SqlBulkCopy bulkCopy = new SqlBulkCopy(destinationConnection);
bulkCopy.DestinationTableName = "Destination";
bulkCopy.WriteToServer(reader);
reader.Close();



Mirrored storage arrays

Because of the increased risks of natural and man-made disasters, each organization has their own disaster recovery plans. Most of the organizations keep a backup of their data on tapes in a remote location. But since transportation of these tapes from one place to another and then loading them on to an alternate server to bring the data online consumes hell lot of time. For faster disaster recovery, a live secondary server site which has a replica of the production data at the primary site is required and this is what Storage mirroring technology makes possible. Here, two storage systems kept at a large distance from each other transparently send data packets to each other and in the event of a disaster at one site, the other site can take over almost instantaneously because it has the most recent copy of whole of the critical data. Since the mirroring is done by the storage system, it does not add any additional load to the data center servers in this process. There have been some dramatic improvements in reliability and disaster readiness because of this technology.

IP SAN

When Storage Area Networks appeared in the market, they were seen as an expensive storage solution, which only a large data center could afford. But the speed of access and the security provided by SANs made them an attractive choice for large data centers.

Then came IP SAN, a Storage Area Network implemented using the Internet SCSI (iSCSI) protocol. IP SANs provide all the benefits of SAN (security, speed and scalability) but at a lower cost as the ISCSI uses regular Ethernet adapters, cables and switches for storage-server connectivity. Thus the organization adopting IP SAN can use the existing local area networks for dual purposes; for data and storage connectivity. In fact, since this technology is based on IP standards, so one can easily connect remote offices over the WAN, using IP protocols, into the central data centre for consolidation and back-up of data.

Thin provisioning

Storage users generally over-estimate their disk space requirements as they have very little idea about how their requirement will grow over time. So each user tends to keep a little 'buffer' in their storage capacity estimates and this adds on to a huge storage capacity out of which only less than half the storage capacity gets consumed. For whole of the storage capacity the organizations pay a huge sum and if they are paying for something which they are not even using then it is a drawback. To avoid this one can use thin provisioning; this dramatically improves the storage capacity utilization within an organization and thereby reduces costs significantly.

Teredo Tunneling

NAT has been used to overcome ipv4 address shortage as it acts as an interface between Internet and the local network. It translates private address of local network to the public address of ISP. Now that ipv6 is a reality, overcoming the ipv4 to ipv6 transition is an important issue. This issue was resolved to certain extent by 6to4 protocol, that could be implemented on NAS.
Teredo Tunneling is a protocol that gives ipv6 connectivity to nodes that connect through NAT devices that do not understand ipv6. In this protocol, ipv6 packets are encapsulated into ipv4 UDP datagrams that can route through NAT and ipv4 Internet. Teredo was introduced because 6to4 protocol, that is most common ipv6 over ipv4 protocol, was economically and technically difficult to implement on most NAT devices. Teredo in turn is implemented on nodes itself that can easily understand the encapsulated packets and thus gain ipv6 connectivity without NAT being ipv6 aware.