December 18, 2014
Everyone in IT understands that there are disasters and then there are disasters. Regardless of the scale of any interruption in operations, disaster recovery plans generally comprise details describing how IT will accomplish the two most important tasks they will face in the event of a disaster: business continuity contingencies and the recovery of lost data. While being “down” and “disconnected” from the rest of the world can be financially devastating, losing the data upon which the business relies is equivalent to a monarch losing the crown jewels. Now that’s a disaster, no matter what the underlying cause.
Before Web 2.0 made its way onto the corporate stage, a backup – or two – kept us convinced that, should we lose data for some reason, we could always get it back and, more important, get it back in such a state that we’d have lost nothing more than time. With Web 2.0, however, that task has become a bit trickier. There’s more data, more often, that needs to be backed up and replicated, and only so many hours in the day (the dreaded maintenance window) in which we can accomplish this important task.
Read more here…f5.com
December 11, 2014
With their offline Google Gears released last year, Google Inc., reinforced it’s dominance of online ads and development further that Microsoft tried to get their hands on Yahoo, one of the leading competitors of Google in the Search Engine aspect of internet use. This has been an unprecedented move by Google for they were the first to release a distributed web application platform and their move to make the same system independent of the web has Microsoft clamoring for a piece of the market it has dominated for so long. Why the sudden move from one of the world’s largest software maker? The internet it helped evolve has become more than many have expected it to be and they have again been caught at the seams of their pants trying to find a piece of the pie so to speak. Microsoft’s domination of the world’s software market has continuously been under threat from open-sourced apps that are now increasing their share (or maybe simply because most open apps are FREE) of the market and big companies are being threatened that even Microsoft has opened doors to open-sourced developers for more inter-operability functionality with Microsoft’s existing Office systems.
December 4, 2014
There used to be a lot of confusion over two decades ago, when the Internet was rising in popularity by leaps and bounds and where this was making computer use mandatory, the idea of using high tech programming was daunting. Today though, this is not the case anymore. Today there are so many things you can do on the Internet and do easily. Now there are tools to make work easier, better, more organized. Web applications are these such tools.
November 27, 2014
This document examines the architecture behind the early access version of the Adventure Builder Sample Application, which focuses on using the latest Java 2 Platform, Enterprise Edition (J2EE™) 1.4 technologies. For recommendations and guidelines on architecting and designing enterprise applications, see Designing Enterprise Applications With the J2EE Platform, Second Edition. For recommendations and guidelines on architecting and designing Web services, see Designing Web Services with the J2EE Platform.
November 19, 2014
Up until recently, my mobile internet connection here in the Philippines have disappointed me miserably. I signed up for it because I marveled at the fact that i can bring my internet connection anywhere I go ( being a blogger, an internet connection is quite essential to your craft and a fast connection is a must).
It all started in March 2007 when i signed up for Globe Visibility after being launched a month back. At first it was awesome because there were probably a few of us at that time. The Connection was so fast, i downloaded every content i could think of and eventually forced me to buy 3 new external hard drives to store all of those files. Plus, the added convenience that you can log on to any Wiz Spot further added to my decision to avail of it.
But just like a marriage or courtship period, it has its honeymoon and stormy period. My connection problems started and gave me a head ache. They still billed me every month even if i cannot use their service. Every time i call a customer service rep, the replies are all the same. Number 1 is they are fixing something to improve the service. Man, it took them a very long time and i mean a very long time to figure it out. My guess is they did not anticipate that many people will avail of this product and the bandwidth allocation for this service diminished every time a new subscriber comes in.
I was getting hopeless. My projects and blogs were delayed.If not for the Unlimited WIZ access that comes with Visibility, i would have probably lost my mind. My expatriate friends have the same problems. we even joked about its name. Instead of being called Visibility, it should rather be Invisibility.
Moving on, in those agonizing months where i could not have a decent net connection, something happened. My connection was back to its usual speed and it was a welcome development. My sources told me that one of the reasons the problem persisted was due to the 3G signal and the cellular signals being bundled together. Because of this, both signals are stretched too thin because Makati ( the Philippines’ Central Business District) probably has one of the largest concentration of cellphone usage. My source further added that the turnaround that happened in February 2008 was due to the separation of those signals. Meaning 3G signals for internet connection got its own bandwidth while 3G signals for calls, text and value added services were also given their own.
After hearing her explanation, i felt relieved. But i could not figure out though why it took them 3/4 of a year to address this problem. Many precious hours wasted because of this. Well, I hope this wont happen again because i have plenty of stuff to write about. Globe’s mobile internet connection getting back on its feet and becoming visible again is truly a welcome development for us bloggers here in Philippines.
November 12, 2014
This document takes you through the basics of using NetBeans IDE 5.0 to develop web applications. This document is designed to get you going as quickly as possible. For more information on working with NetBeans IDE, see the Support and Docs page on the NetBeans website.
You create, deploy, and execute a simple web application. The application uses a JavaServer Pages™ page to ask you to input your name. It then uses a JavaBeans™ component to persist the name during the HTTP session and repeats the name on another JavaServer Pages page.
November 5, 2014
The the police have formulated a â€žnobleâ€ś plan, still, there are flaws that need to be revised and improved. The issue of clicking their way to jail had caused a debate through those who knew of it. Though some are caught and locked up in jail, there are still people without URLâ€™s that allow the authorities to identify them. In other words, this is a plan that doesnâ€™t wipe-out the crime of child pornography but encourages a brand new method of doing it.
Since human beings are flawed too, there is no question that there would always be loopholes. Like technology has fought with technology, so does man need to face with man.
October 29, 2014
image source: www.finkernet.com
Many of us today create our own site for making money, giving information, offering other service and some other features. It is a problem for us how to increase the view of our website everyday. One of the best way is the help of search engines by using search engines optimization your site will get a best chance to be found first on the list depending on the keyword use. But many site already has this features, Andy Mindel and Mike Mindel has a great idea how to increase your seach engine optimization by creating WORDTRACKER. WordTracker is a online analyzer that analyst keyword or key phase that are relevant to them and their client to boost or optimize the use of search engine. It can also determine the number of competing sites that use the same keywords or key phrases that have the greatest traffic potential in selected search engine.
October 22, 2014
To help developers track down and find potential security holes, there are a host of tools available called Web application vulnerability scanners. Their aim is to automate and speed up a process that, when performed manually, is a long and painstaking one. By crawling through a Web site and injecting various attack scenarios, scanners compare an applicationâ€™s responses against a database of security vulnerability signatures.
Despite their usefulness, Web application vulnerability scanners have not become a must-have for every development team, largely because of cost. Yet there are several good open source scanners available for free. In this tip, weâ€™ll examine a few other reasons for the holdup in Web application vulnerability scanner adoption.
October 15, 2014
The technology today has been used as a gadget to help out in different areas. One of these areas is crime. There had been notorious propagandas regarding child pornography in the net. Now, technology is used to fight technology itself.
Child pornography is a site where underaged kids are asked to pose maliciously. It is no different with child abuse. It deprives the children of a morally dignified life style. This is, of course, illegal and the authorities have made way to fight it.