Tech Talk

Digital Transformation, Artificial Intelligence, Machine Learning, IoT, Big Data Analytics, Enterprise Architecture, Performance Engineering, Security, Design and Development tips on Java and .NET platforms.

Thursday, December 29, 2005

About Daemon Threads in Java

›
Came across this cool article about Daemon Threads at http://www.absolutejava.com/main-articles/beware-the-daemons/ I knew that the VM does ...
Monday, December 26, 2005

Debug information in Java .class files

›
I have often wanted to learn more about the class file format of Java class files. This study let me to interesting discoveries - regarding ...
Friday, December 23, 2005

Select second highest record with a query

›
A friend of mine was asked in an interview to write a query to fetch the second highest marks in a table of students. Well, I found out 2 wa...

Hierarchical databases Vs Relational Databases

›
While designing a systems, I often came across the moot point of choosing btw a heirarchical database and a relational flat table database. ...
Thursday, December 22, 2005

The beauty of Log4J

›
It took me sometime to appreciate the inheritance heirarchy in Log4J. It's quite simple to understand the Log Levels and their usage. It...

Ruminating on ClassLoaders in JVM.

›
One interesting point about ClassLoaders is that it is possible for the same class to be loaded separately by different class-loaders, resul...
Wednesday, December 21, 2005

O/R mapping tools

›
I have had some experience with some O/R mapping tools such as TopLink and Hibernate. But I did not know that the market is flooded with a ...
Tuesday, December 20, 2005

Is Swing really slow?

›
Often I have heard people complain that Swing Apps are slow. I also have had some bad experiences with slow Swing Apps, but then I have also...
Wednesday, December 14, 2005

Duplicate Form Submission and the Synchronizer Token pattern

›
The Synchronizer Token pattern addresses the problem of duplicate form submissions. A synchronizer token is set in a user's session and ...

Proxy setting for .NET programs

›
To access an internet site thru a .NET program U may have to go thru Ur company proxy. Here's the sample code for doing so: string query...

Locking in Databases

›
Databases support different types of locking strategies. We have optimistic locking strategies where concurrency would be more, but data int...
Tuesday, December 13, 2005

Deleting duplicate rows from a table

›
This seems to a favourite question during interviews - How to delete duplicate rows in a table? Well, we can have many strategies: - Capture...
Thursday, December 08, 2005

Tools used in SDLC

›
I decided to list down all the available tools for different phases of a SDLC. Here it goes: Requirements Management: - DOORS : Dynamic Obje...

Cool Free Data Models

›
While browsing the web, I came across this cool site which has over 200 data-models samples. Great for anyone who wants to learn about data-...

Data Modelling Vs OO Modelling

›
While working on projects, often I had tussles with erst-while database developers who used to drive the design of the system using Data Mod...

What are Multi-dimensional databases?

›
A multidimensional database (MDB) is a type of database that is optimized for data warehouse and online analytical processing (OLAP) applica...
Tuesday, December 06, 2005

Ruminating on Database Cursors

›
Cursors are database objects that allow us to manipulate data in a set in a row-by-row basis or on a group of rows at one time. Cursors are ...
Monday, December 05, 2005

Quick HEX dump utility in DOS

›
Recently, I wanted to see the hex dump of a binary file on a server. The server machine did not have my favourite hex GUI editors. I strugg...

Cool APIs for packet sniffing

›
A few years back, I often used to lament on the lack of packet sniffing API's available in Java or C#.NET. I knew of the WinPcap library...
Friday, December 02, 2005

DataReader Vs DataSet in ADO.NET

›
Came across a wonderful article on MSDN which contrasts the use of DataReader Vs DataSet. The article is available at : http://msdn.microsof...

User Defined Functions Vs Stored Procedures

›
Most databases have built-in functions, such as GetDate, DateAdd, and ObjectName. Such built-in functions are useful, but you can’t alter th...
Friday, November 25, 2005

Microsoft Enterprise Application blocks

›
Recently, Microsoft's Pattern & Practices Group has released the Enterprise Library, a large configurable and extensible software li...

Ruminating on Transactions

›
Most of us have worked on transactions one time or the other. Transactions can be broadly classified as local or distributed . Local transa...

Making web service proxy URL dynamic in .NET

›
In VS.NET, whenever we add a web-reference to a webservice, what happens behind the scenes is that a proxy is created which contains the URL...
Thursday, November 24, 2005

Object pooling in Java

›
Quite often, we may have to use object pooling to conserve resources and increase performance. I came across some pretty good abstract compo...

Doug Lea's Home Page

›
I have been impressed with the genius of Doug Lea when I saw his concurrent package in Java. His home page contains a lot of interesting lin...

Thread pools in Java

›
I have often used thread pools in my applications. My favourite opensource thread pool was the PooledExecutor class written by Doug Lea (ava...
Thursday, November 17, 2005

StringBuilder in Java 5.0

›
There is a new class in Java5.0 - StringBuilder class that can be used whenever we are doing some heavy-duty string manipulation and we do n...
Wednesday, November 09, 2005

Understanding Unicode

›
I still see many people with a lot of myths about Unicode. I guess the reason for this is that a lot of people still feel that Unicode is a ...

On Bytes and Chars...

›
During i8n and localization, we often come across basic fundamental issues such as: - How many bytes make a character? - How many characters...
‹
›
Home
View web version
Powered by Blogger.