ADS BY GOOGLE

Identity management just isn’t what it used to be. Gone are the days when knowing who had access to what was simply enough. In today’s world of increasing government and industry regulation; networked communications and collaboration; and pervasive mobility, the requirements have funda...
Now that you have the JavaScript skills that you need for using jQuery, you’re ready to learn jQuery. So, in this excerpt, you’ll learn a working subset of jQuery that will get you off to a fast start. When you complete this section, you’ll have all the jQuery skills that you need fo...
In today’s environment, information security is crucial for everyone. Security needs vary widely from protecting social security numbers to guarding corporate strategy. Information espionage can occur at all levels. A human resources employee or manager takes employee personnel files h...
Using OpenFlow to extend software-defined networking (SDN) to the optical layer is a compelling prospect for enterprises seeking to achieve joint orchestration of information technology (IT) and network resources for cloud services, to virtualize the network and to more simply manage i...
Component-oriented development has many architectural advantages. In spite of this, many developers tend to solve problems the monolithic way on the first go. This article demonstrates how a monolithic design can be modified to achieve component-based design. During this conversion pro...
The Java Platform Enterprise Edition 7 specification early draft is available for download. All these years the focus was to introduce several APIs and technologies as part of the platform to make it more powerful, simple and complete. This is the first time the focus has shifted in a ...
Increasingly organizations are looking to tap the collective power of social, mobile and cloud technologies. We asked Ric Telford, IBM VP of Cloud Services, to share his perspective on the trend in light of IBM's new social business software including SmartCloud Docs, a cloud-based off...
Designing and implementing a hybrid encryption application is a big challenge but without a supporting infrastructure it’s almost impossible. There are open source libraries that allow you to encrypt a file but only provide the translation technique. After the information has been encr...
The advantages of virtualization are obvious for almost everyone. One of the first influential articles on the subject was my article [1] which was of interest to more than 48,000 readers. Below you will find useful and quick methodology on how to install and use Fedora 17 under the Wi...
MySQL, just like other relational databases, is complicated. It can jam at any time jeopardizing your applications or business without notice. Most MySQL malfunctions are due to common mistakes. It is essential to avoid these mistakes, often hidden by configuration trap or workload, to...
We all know that since the early ‘90s, Internet usage has exploded. Buying online, booking a trip or communicating with friends and relatives are just a few examples of what all of us are doing every day. The continuous development of broadband connectivity has also made easy the growt...
Cloud computing is so alluring. The public cloud economizes infrastructure resources and creates a scalable, on-demand source for compute capacity. Additionally, the cloud can be a strategic asset for enterprises that know how to migrate, integrate and govern deployments securely. App...
Because of the efforts of people like Steve Souders, John Resig, Sergey Chernyshev, Paul Irish, ... a lot has changed when it comes to optimizing web site performance. Browser and Application Performance Vendors built tools to make Web Performance Optimization easier than ever before. ...
Let’s start with the basic question: What is the disruptor? The disruptor is a concurrency framework for Java that allows data sharing between threads. The age old way of coding a producer-consumer model is to use a queue as the buffer area between the producer and the consumer, where ...
Service Oriented Architecture was hailed as the next major leap ahead in the ICT industry and was predicted by many to be as big a leap forward as that achieved with Object-Oriented software design patterns. For example, in 2006, Joseph Bih introduced SOA in a research article as an in...

CTOlabs.com is a research tool information on technologies, concepts and companies of interest to enterprise IT professionals. The CTOlabs Disruptive IT List is a curated list of firms we believe hold the greatest potential for positive disruption in the enterprise IT space. Our wri...

In this article I will provide you an effective and optimized approach of Factory Design Pattern in Java. As you know theFactory Method Pattern or popularly known as the Factory Design Pattern is one the design patterns under the category of "Creational Design Pattern". The basic prin...
Consumers are continuing to adopt multiple connected devices and video content is expected to reach more than 70 percent of global traffic. This growth and the increased reliance on wireless networks is putting stress on existing 802.11a/b/g/n networks. As a result of this high usage, ...
This article gives you an inner insight into the design of a better singleton design pattern. In this article you will be able to learn how break a singleton design if it not designed properly. It will help you to follow the best practices adopted in the industry. A few days ago when ...
Open source software has probably been the biggest driver of complex software solutions in the last decade. Access to a large variety of quality, peer-reviewed software has accelerated product development, reduced product introduction intervals and lowered the costs for producers of so...
Business processes manage the operational flow of business and when optimized achieve cost containment and flexibility as they need to be efficient and able to adapt to changing business conditions. The art of planning and implementing process management requires all the best cross-fun...
Studies suggest that businesses are adopting cloud much faster than IT, which is fair considering the fact that tightly coupled on-premise applications and outdated platforms from the previous decade made businesses realize only 30% of their budgets as business capabilities and the res...
The Datapower appliances support the use of the FTP protocols for message transport. The purpose of this article is to present number of common use case scenarios for FTP polling, illustrating correct configurations of the device to support the use case. The use case scenarios are as ...
Some people might think of cloud adoption as a marathon: a set distance to a clear goal, where keeping focus and maintaining a steady pace will ensure a winning outcome. While there is an element of truth to that, I consider the implementation process more of an obstacle course, with t...
Design patterns are one of the most successful advances in software engineering, by any measure. The history of design patterns is a strange one though, and somewhere along the way, much of their original utility and elegance has been forgotten, misplaced, or simply miscommunicated. Th...
Modularity plays an important role in software architecture. It fills a gap that has existed since we began developing enterprise software systems in Java. This chapter discusses that gap and explores how modularity is an important intermediary technology that fills that gap. There a...
Many organizations are starting to look at cloud computing as a universal solution, but there are many applications that cannot be considered unless the framework of cloud computing includes Timing as a Service (TaaS) as part of its fabric. Mission-critical applications require securit...
In a recent article, CIO.com said that analytics and BI will be the top technology priorities for CIOs in 2012, based on a Gartner Inc. survey of IT executives. However, if you look back in time, reports show that BI was a top priority even then. Although we have fast-forwarded many ye...
In a time where the clock speeds of processors have been stable over the past couple of years, and Moore's Law is instead being applied by increasing the number of processor cores, it is getting more important for applications to use concurrent processing to reduce run/response times, ...
Any application you pick up, there are some issues – big or small. There will be copy-paste code, mistakes, algorithms which could have better thought through. But what distinguishes an antipattern from these normal errors is that like patterns these antipatterns are recurring througho...
The Spring Data Neo4j Project This project is part of the Spring Data project, which brings the convenient programming model of the Spring Framework to modern NOSQL databases. Spring Data Neo4j, as the name alludes to, aims to provide support for the graph database Neo4j. The first p...
Defining "Who sees what" and "who does what" are the two important aspects of access control in any software application. "Security" is a much larger subject, but this article focuses on just the access control aspects of Security in a software application. When you build a custom ap...
Performance is one word that is used to describe multiple scenarios when talking about application performance. When someone says I need a High Performance Application, it might mean any/all of the following: Low web latency application ( meaning low page loading times) Application t...
HTML5 is a draft specification for the next major iteration of HTML. It represents a break from its predecessors, HTML4 and XHTML. Some elements have been removed and it is no longer based on SGML, an older standard for document markup. HTML5 also has more allowances for incorrect synt...
In early JVM releases, it was common to delegate Java monitor operations directly to operating system monitors, or mutex primitives. As a result, a Java application experiencing lock contention would exhibit high values of system CPU utilization since operating system mutex primitives ...


ADS BY GOOGLE