Tech Talk

Digital Transformation, Artificial Intelligence, Machine Learning, IoT, Big Data Analytics, Enterprise Architecture, Performance Engineering, Security, Design and Development tips on Java and .NET platforms.

Friday, April 19, 2013

Portals vs Web Apps

›
I have often debated on the real value of Portal servers (and the JSR 268 portlet specification). IMHO, portal development should be as sim...
Tuesday, April 16, 2013

Web Application Performance Optimization Tips

›
The following link on Yahoo Developer network on Web App Performance is timeless ! I remember having used these techniques around 8 yrs ago...
Tuesday, April 02, 2013

Ruminating on Availability and Reliability

›
High availability is a function of both hardware + software combined. In order to design a highly available infrastructure, we have to ensu...
Monday, March 25, 2013

Ruminating on Server Side Push Techniques

›
The ability to push data from the server to the web browser has always been a pipe-dream for many web architects. Jotting down the various ...
Monday, March 18, 2013

What is the actual service running behind svchost.exe

›
I knew that a lot of Windows Services (available as DLLs) run under the host process svchost.exe during start-up. But is there any way to f...
Tuesday, March 12, 2013

Behind the scenes..using OAuth

›
Found the following cool article on the web that explains how OAuth works behind the scenes.. http://marktrapp.com/blog/2009/09/17/oauth-d...
Thursday, March 07, 2013

Jigsaw puzzles in PowerPoint and Visio

›
Found this cool tutorial on the web that can be used to make jigsaw puzzles in PowerPoint or Visio. One of my friends actually used this te...
Monday, March 04, 2013

Long file names on Windows

›
Just spend the last 30 mins in total frustration on the way Windows 7 handles long file names. I was essentially trying to copy "LifeR...
Monday, February 11, 2013

Ruminating on Visualization Techniques

›
The following link contains a good illustration of the various kinds of visualization techniques one can use to communicate ideas or clarif...

Anscombe's Quartet

›
We often use statistical properties such as "average", "mean", "variance", "std. deviation" during...

Useful Command Line Tools for Windows 7

›
Jotting down some Win 7 commands that I often use for quick access to information. One can directly type these commands in the 'Run...

Ruminating on Big Data

›
Came across an interesting infodeck on Big Data by Martin Fowler. There is a lot of hype around Big Data and there are tens of pundits defi...
Tuesday, December 18, 2012

Generating Alphanumeric Random Strings

›
In one of my previous blog post , I had mentioned about the excellent Apache Commons RandomNumberGenerator utility class that is very handy...
Monday, December 03, 2012

Ruminating on Schematron and XML Validation

›
Schematron is a rule-based XML validation language. It can be used for making assertions on patterns in XML nodes. For e.g. if a person (el...

Difference between XSL, XSL-FO and XSLT

›
The XSL (Extensible StyleSheet Language) specification has a long history and has gone through multiple revisions. Many folks are confused ...
Sunday, November 25, 2012

Free Data Modeling tools

›
There are a plethora of free and opensource UML modeling tools available in the market. But there is very little awareness regarding free d...
Friday, November 02, 2012

UI Framework Classification

›
Today there are a plethora of frameworks and technologies available for create RIAs. Our customers often ask us to advice them on the best ...
Tuesday, October 30, 2012

Ruminating on Transaction Logs

›
Understanding the working of transaction logs for any RDBMS is very important for any application design. Found the following good articles...
Wednesday, October 17, 2012

Peformance impact of TDE at database level

›
I was always under the opinion that column-level encryption is better and more performant than database or tablespace level encryption. But...
Tuesday, October 16, 2012

Column Level Encryption in SQLServer

›
We were exploring the option of using cell-level or column-level encryption in SQL Server. The option of using TDE (Transaparent Data Encry...
Monday, October 15, 2012

Where is the private key of a Digital Cert stored?

›
Today, one of my team members asked an innocuous question that whether the private key is stored in a digital certificate? The answer is ...
Monday, October 08, 2012

Random Number Generator Code

›
We were writing a common utility to help the development team is generating random numbers. The utility would allow the developer to choose...

UUID vs SecureRandom in Java

›
Recently, one of my team members was delibrating on using the java.util.UUID class or the java.util.SecureRandom class for a use-case to ...

Ruminating on random-ness

›
Anyone who has dabbled at cryptograpy would know the difference between a PRNG and a TRNG :) PRNG - Psuedo Random Number Generator TRNG -...
Wednesday, October 03, 2012

Troubleshooting XML namespaces binding in SOAP request using JAXB

›
Recently helped a team resolve an issue regarding namespace handling in JAX-WS / CXF. Jotting down the solution as it might help other folk...
Tuesday, September 25, 2012

Ruminating on Hibernate Entities and DTO

›
Today we had a lengthy debate on the hot topic of Hibernate entities vs DTO to be used across layers of a n-tiered application. Summarizin...

Annotations are used at compile-time or runtime?

›
There is a lot of confusion among folks on the scope of annotations - whether annotations are used only at compile-time or also at runtime?...

Serializing JPA or Hibernate entities over the wire

›
In my previous post , we discussed about the need to map properties between Hibernate entities and DTOs. This is required, because Hibernat...
Friday, September 21, 2012

How RSA Protected Configuration Provider works behind the scenes?

›
We were using the " RSA Protected Configuration provider " to encrypt sensitive information in our config files. I was suprised t...

How does DPAPI work behind the scenes?

›
In my previous post , we saw how DPAPI can be used on Windows platforms to encrypt sensitive information without having to worry about key ...
‹
›
Home
View web version
Powered by Blogger.