Huge Discounts on Mobiles, Books, Cameras, Computers etc: @Flipkart

Tuesday, February 28, 2006

Up, up and away with Java EE 5

J2EE 1.5 is now Java EE 5.

With version 5 of the Java Platform, Enterprise Edition (Java EE, formerly referred to as J2EE), development of Java enterprise applications has never been easier or faster. The aim of the Java EE 5 platform design has been to streamline the features and add convenience, improve performance, reduce development time, and help developers get products to market that much sooner.

Here are a few of the significant changes:
  • Most boilerplate requirements have been eliminated, and XML descriptors are now optional. For example, the ejb-jar.xml descriptor is no longer necessary in most cases.
  • More defaults are available, with a special emphasis on making them meaningful. Developers now have fewer details to remember.
  • Web service support is simpler, and the number of supported standards has increased.
  • The EJB software programming model is significantly simpler.
  • The new Java Persistence API is available to all Java platform applications, including those based on EJB technology.
  • JavaServer Faces technology has been added to make web application design more convenient.
Other relevant highlights include - Enterprise Application Development Made Easy (annotation framework), Streamlined EJB Software Development (Fewer required classes and interfaces, Optional deployment descriptors, Simple lookups, Simplified & lightweight persistence for object-relational mapping, Interceptors etc..), Easier Access to Resources Through Dependency Injection (object's dependencies are supplied automatically by an entity external to that object), Lightweight Java Persistence API Model, Simpler, Broader Web Service Support (JAX-WS 2.0), Convenient Web Application Design With JavaServer Faces Technology (a server-side framework that provides UI components for building web applications), JavaServer Pages Standard Tag Library, JAXB 2.0 etc..

Read more:

If you appreciate the quality of O'Reilly books, this is a great site for Enterprise Java:

Go ahead, try the 'Project GlassFish', dive in!

Monday, February 20, 2006

Multi-touch Screens

Imagine you are inspecting a 3D model on the computer screen. How would you like if you have the option to rotate, zoom in, zoom out and all with your fingers on the screen, rather than going for the mouse or keyboard. Or say you are drawing a picture... what about dipping your finger in a color and just rubbing it on the screen to paint that picture of yours? Sounds good? Then be ready to welcome multi-touch screens.

Follow the link for a demo video and more info:

Friday, February 17, 2006

IP: Your identity in net

So, how anonymous are you in the internet, or as a matter of fact, any network? But generally internet is considered unsafe, unrestricted and uncontrolled and hence everyone browse around with much increased caution than your trusted LAN or WAN. People generally use at least a firewall and an up-to-date antivirus before they jump into the World Wide Web. Business networks go a step beyond and make sure they have a tightened hardware or software proxy/firewall too. Still you think you are fully anonymous? Try clicking the following link and find what I know about you:

Note: Be known, you can be traced back to your doorstep ;-)

Monday, February 06, 2006

System, heal thyself

Have you heard of Autonomic Computing? Not yet?! You need a lot of catch up to do pal; you are running behind in the world of IT. Autonomic Computing was inspired from the autonomic nervous system in our body, which reacts to most of the reflexes by itself, without always waiting for the control centre, brain, to analyze and take corrective action. Feel lucky that you are able to take your hand off that hot iron before you need to see smoke coming from your hand!

Autonomic Computing is a vision, a new path in Information Technology, aiming to build self-managing systems. As we climb up the technology ladder, juicing out more from technology applied to daily use, systems tend to get complex. Complexity increases administration costs and makes it more error prone. Most of the system administration tasks are mundane and doesn't need the much valuable time and effort of a technical expert. Think of a new world, where systems themselves take care of most of those silly errors, and will wake up the nodding admin if something is out of its control. Wow, what a beautiful world, isn't it?

If you still think I am talking about 2020, where robots would be walking around, does every work and you just need to press that blue button for a robot to bring your food, wake up! It is happening now, and everyone is talking about it, everywhere. IBM has released something called an Autonomic Computing Toolkit, which has tools and technology to make almost any system autonomic. The four main aspects of making a system self-managing is thru making it self-healing, self-optimizing, self-protecting and self-configuring (Self-CHOP characteristics). The Autonomic Computing team in IBM has even released two working scenarios, showcasing the self-healing and self-configuring features of Autonomic Computing.

Here is an introduction video on Autonomic Computing, by the leaders of this initiative. Find out why IBM ‘thought leaders’ believe autonomic computing is a remedy whose time has come:

If you are in orkut (google community), I found a group dedicated for Autonomic Computing there:

So, what are you waiting for? Go ahead and dive into the world of Autonomic Computing:

May be you can learn by trying out something too. Here is the link to the freely downloadable Autonomic Toolkit:

Have questions? Here is the 24x7 monitored forum for all your AC queries:

Friday, February 03, 2006

MyWife - scheduled to attack this Friday, Feb. 3

BlackWorm (MyWife.d), Severity: High Risk

BlackWorm is a new and potentially destructive Internet worm currently making its way around the globe. It is infecting users via e-mail and is scheduled to destroy all Microsoft Word, Excel, PowerPoint, PDF, PSD and ZIP files on Feb. 3. Open emails from strangers cautiously and be careful with the attachments. Update your antivirus right now.

W32.Blackmal.E@mm is a mass-mailing worm that attempts to spread through network shares and lower security settings. On the third day of every month it attempts to rewrite files with certain extensions with custom text. This attempts to send itself as an email to the addresses it gathers using its own SMTP engine.

CME-24, Win32.Blackmal.F [Computer Associates], Email-Worm.Win32.Nyxem.e [F-Secure], Email-Worm.Win32.Nyxem.e [Kaspersky], W32/MyWife.d@MM [McAfee], W32/MyWife.d@MM!M24 [McAfee], Win32/Mywife.E@mm [Microsoft], W32/Small.KI@mm [Norman], Tearec.A [Panda Software], W32/Nyxem-D [Sophos], WORM_GREW.{A, B} [Trend Micro]

Note: The destroyed files have the following text:
DATA Error [47 0F 94 93 F4 F5]

More information on Virus visit here

Removal Tool

Links to AV Vendor pages
Symantec Latest Virus Threats:
McAfee Newly Discovered Threats:
McAfee Recently Updated Threats:
Trend Micro Virus Advisory Site:
One Stop Vendor Threat Reference Site: