Wednesday, June 20, 2012

Software architects need not apply

JW Archive: How the Java virtual machine performs thread synchronization | Ruby, Clojure, and Ceylon: Same goal, three very different results

JavaWorld

Forward this to a Friend >>>


Software architects need not apply
An architect needs to be working among the masses and not lounging in the ivory tower. Indeed, it would be nice if the title "software architect" was NOT frequently seen as an euphemism for "can no longer code." Read More


WEBCAST: SAP

Automate Your Partners for Efficient E-Business
Join IDC's Maureen Fleming and SAP for an insightful Webcast on the different approaches companies are taking to B2B integration and how you can ask the right questions to reassess your B2B approach. Learn More

JW Archive: How the Java virtual machine performs thread synchronization
All Java programs are compiled into class files that contain bytecodes, the machine language of the Java virtual machine. In this JavaWorld classic, Bill Venners goes under the hood of the JVM to explain the mechanics of thread synchronization, including shared data, locks, monitors, and synchronized. Like many JW Archives, this article is as relevant for students of JVM internals today as it was when it was first published in July 1997. Read More

Ruby, Clojure, and Ceylon: Same goal, three very different results
Even languages that are created with similar goals in mind may yield highly disparate final results, depending on how their communities understand those goals. Ruby, Clojure, and Ceylon are three such languages. Read More

Eclipse developers moving to mobile
Mobile application development is gaining momentum within the Eclipse Foundation open source community, according to newly released report. Read More

Beyond Hamcrest Core matchers in JUnit
In this post, I look at using some of Hamcrest's non-core matchers with JUnit. These non-core matchers are NOT included with JUnit by default, but are available by including a Hamcrest JAR in the classpath. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_java as dailynews195@yahoo.fr.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Software architects need not apply

JW Archive: How the Java virtual machine performs thread synchronization | Ruby, Clojure, and Ceylon: Same goal, three very different results

JavaWorld

Forward this to a Friend >>>


Software architects need not apply
An architect needs to be working among the masses and not lounging in the ivory tower. Indeed, it would be nice if the title "software architect" was NOT frequently seen as an euphemism for "can no longer code." Read More


WEBCAST: SAP

Automate Your Partners for Efficient E-Business
Join IDC's Maureen Fleming and SAP for an insightful Webcast on the different approaches companies are taking to B2B integration and how you can ask the right questions to reassess your B2B approach. Learn More

JW Archive: How the Java virtual machine performs thread synchronization
All Java programs are compiled into class files that contain bytecodes, the machine language of the Java virtual machine. In this JavaWorld classic, Bill Venners goes under the hood of the JVM to explain the mechanics of thread synchronization, including shared data, locks, monitors, and synchronized. Like many JW Archives, this article is as relevant for students of JVM internals today as it was when it was first published in July 1997. Read More

Ruby, Clojure, and Ceylon: Same goal, three very different results
Even languages that are created with similar goals in mind may yield highly disparate final results, depending on how their communities understand those goals. Ruby, Clojure, and Ceylon are three such languages. Read More

Eclipse developers moving to mobile
Mobile application development is gaining momentum within the Eclipse Foundation open source community, according to newly released report. Read More

Beyond Hamcrest Core matchers in JUnit
In this post, I look at using some of Hamcrest's non-core matchers with JUnit. These non-core matchers are NOT included with JUnit by default, but are available by including a Hamcrest JAR in the classpath. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_java as foeprotais.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Windows Phone joins the Windows 8 and corporate parties

Questions lurk below Microsoft's Surface | 15 awesome IT tools for Mac OS X

InfoWorld Daily

Forward this to a Friend >>>


Windows Phone joins the Windows 8 and corporate parties
A major change in Microsoft's smartphone platform provides core OS, graphics, and Web features across smartphones, tablets, and PCs. Read More


RESOURCE COMPLIMENTS OF: Marquette University

Break into or move ahead in IT
A master's degree in computing from Marquette University will help you become a leader in the IT field. Evening, in-the-cloud and online classes are available. marquette.edu/computing Click to continue

WEBCAST: Alcatel-Lucent

Rethinking the IP core
This webinar will outline the key requirements placed on core networks of the cloud era, and innovation from Alcatel-Lucent to ensure that core networks scale efficiently without compromising versatility. Learn More

Questions lurk below Microsoft's Surface
Microsoft's new tablet PC comes with a ton of hype, but also a truckload of unanswered questions, including one from Cringely: Why now? Read More

15 awesome IT tools for Mac OS X
Here are some of the some of the networking, server administration, and other tools IT pros have collected over the years to optimize the Apple platform. Read More

Windows 8's one advantage: Better security
Along with the boot process enhancements to security, Microsoft has also enhanced security features such as BitLocker, AppLocker, and DirectAccess. Read More

The Big Data Challenge: How to Develop a Winning Strategy
Developing a winning Big Data strategy is challenging because it is as much about getting ahead of the trend and acquiring talent as it is about investing in new technology. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_daily as foeprotais.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Windows Phone joins the Windows 8 and corporate parties

Questions lurk below Microsoft's Surface | 15 awesome IT tools for Mac OS X

InfoWorld Daily

Forward this to a Friend >>>


Windows Phone joins the Windows 8 and corporate parties
A major change in Microsoft's smartphone platform provides core OS, graphics, and Web features across smartphones, tablets, and PCs. Read More


RESOURCE COMPLIMENTS OF: Marquette University

Break into or move ahead in IT
A master's degree in computing from Marquette University will help you become a leader in the IT field. Evening, in-the-cloud and online classes are available. marquette.edu/computing Click to continue

WEBCAST: Alcatel-Lucent

Rethinking the IP core
This webinar will outline the key requirements placed on core networks of the cloud era, and innovation from Alcatel-Lucent to ensure that core networks scale efficiently without compromising versatility. Learn More

Questions lurk below Microsoft's Surface
Microsoft's new tablet PC comes with a ton of hype, but also a truckload of unanswered questions, including one from Cringely: Why now? Read More

15 awesome IT tools for Mac OS X
Here are some of the some of the networking, server administration, and other tools IT pros have collected over the years to optimize the Apple platform. Read More

Windows 8's one advantage: Better security
Along with the boot process enhancements to security, Microsoft has also enhanced security features such as BitLocker, AppLocker, and DirectAccess. Read More

The Big Data Challenge: How to Develop a Winning Strategy
Developing a winning Big Data strategy is challenging because it is as much about getting ahead of the trend and acquiring talent as it is about investing in new technology. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_daily as dailynews195@yahoo.fr.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Windows Phone joins the Windows 8 and corporate parties

Smartphone security is heading for 'apocalypse' | Hacker group demands 'idiot tax' from payday lender

Today's InfoWorld Headlines: Wrap Up

Forward this to a Friend >>>


Windows Phone joins the Windows 8 and corporate parties
A major change in Microsoft's smartphone platform provides core OS, graphics, and Web features across smartphones, tablets, and PCs. Read More


WHITE PAPER: Box

The ROI of Cloud Apps
Cloud apps continue to gain momentum in the enterprise as buyers are attracted to fast deployment speeds, low upfront costs, and ongoing flexibility to scale up or down as needs change. This report analyzes the five-year ROI for cloud apps across CRM, ERP, collaboration, and IT service management. Read Now!

WHITE PAPER: Oracle

Proven Value with the Oracle Database Appliance
This executive brief highlights the data management challenges a California-based organization faced and illustrates how their chosen solution resulted in cost savings and in better overall use of IT resources - and exceeded all expectations. Learn More!

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More

Hacker group demands 'idiot tax' from payday lender
Hacker group Rex Mundi has made good on its promise to publish thousands of loan-applicant records it swiped from AmeriCash Advance after the payday lender refused to fork over between $15,000 and $20,000 as an extortion fee. Read More


WHITE PAPER: Box

Empowering Your Mobile Worker
Today's most productive employees are mobile, and your company's IT strategy must be ready to support them with 24/7 access to the business information they need across a range of mobile devices. See how corporations are meeting the many needs of their mobile workers with the help of Box. Read Now!

Google Apps admins can now enforce use of two-step log-in process
Two-step verification, which adds a second layer of security to a log-in process, has been available since 2010 in Google Apps, but now IT administrators will be able to enforce it for all their users as a requirement. Read More

Virtual analysis misses a third of malware
Security vendors sell virtualized appliances to run and analyze the behavior of suspicious applications to identify malware. Over the last few years, cyber criminals have found ways to make their malware appear benign. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_wrap_up as foeprotais.news@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **


Windows Phone joins the Windows 8 and corporate parties

Smartphone security is heading for 'apocalypse' | Hacker group demands 'idiot tax' from payday lender

Today's InfoWorld Headlines: Wrap Up

Forward this to a Friend >>>


Windows Phone joins the Windows 8 and corporate parties
A major change in Microsoft's smartphone platform provides core OS, graphics, and Web features across smartphones, tablets, and PCs. Read More


WHITE PAPER: Box

The ROI of Cloud Apps
Cloud apps continue to gain momentum in the enterprise as buyers are attracted to fast deployment speeds, low upfront costs, and ongoing flexibility to scale up or down as needs change. This report analyzes the five-year ROI for cloud apps across CRM, ERP, collaboration, and IT service management. Read Now!

WHITE PAPER: Oracle

Proven Value with the Oracle Database Appliance
This executive brief highlights the data management challenges a California-based organization faced and illustrates how their chosen solution resulted in cost savings and in better overall use of IT resources - and exceeded all expectations. Learn More!

Smartphone security is heading for 'apocalypse'
The meteoric rise in the smartphone market is creating a dangerous vulnerability in smartphone security - one that may not be patched until the problem expands into what has been dubbed an "apocalypse." Read More

Hacker group demands 'idiot tax' from payday lender
Hacker group Rex Mundi has made good on its promise to publish thousands of loan-applicant records it swiped from AmeriCash Advance after the payday lender refused to fork over between $15,000 and $20,000 as an extortion fee. Read More


WHITE PAPER: Box

Empowering Your Mobile Worker
Today's most productive employees are mobile, and your company's IT strategy must be ready to support them with 24/7 access to the business information they need across a range of mobile devices. See how corporations are meeting the many needs of their mobile workers with the help of Box. Read Now!

Google Apps admins can now enforce use of two-step log-in process
Two-step verification, which adds a second layer of security to a log-in process, has been available since 2010 in Google Apps, but now IT administrators will be able to enforce it for all their users as a requirement. Read More

Virtual analysis misses a third of malware
Security vendors sell virtualized appliances to run and analyze the behavior of suspicious applications to identify malware. Over the last few years, cyber criminals have found ways to make their malware appear benign. Read More




Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_wrap_up as dailynews195@yahoo.fr.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2011 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **