"Over the last twelve months we have transformed the company" said Cormier, promising that the various products and tools to be released and promoted this June would be ones that "define the next generation of computing." But before explaining the details of Red Hat's transformation over the past twelve months, Cormier felt the need to explain how his company had evolved over the past twelve years to become an organization that is uniquely positioned to take the lead in the cloud computing space.
Builder design pattern is a creational pattern like Factory pattern but has a very specific use case. You should be using Builder pattern, when you are creating object with too many optional and some mandatory properties in Java.
Groovy, Scala, and Clojure offer many extension mechanisms, whereas inheritance is virtually the Java language's only option. This installment looks at category classes, the ExpandoMetaClass, implicit casts, and protocols as ways to extend Java classes with the Java.next languages.
The Activity class is the
workhorse of an Android mobile app, and it's also where you can
fine-tune your app's interactions with both the user and the mobile device. Get things working exactly the way you want them in your app's lifecycle, then use icons and action bars to guide users through UI navigation and other app features.
This article launches a new developerWorks series by Neal Ford that performs a
deep comparison of three next-generation JVM languages: Groovy, Scala, and Clojure. In
this initial installment, find out what you'll gain from understanding their similarities and differences -- whether or not you choose to keep using Java as your main programming language for now.
The last of three installments about commonalities among Clojure, Scala,
and Groovy investigates how these languages handle exceptions, expressions, and null
-- all problem areas for the Java language. Each of the Java.next languages addresses
the shortcomings of the Java language through a unique implementation that highlights that language's characteristics.
The ultimate goal of agile methods is to provide delivering desired software accurately and as soon as possible to the customer. Agile methods do not mean too much at the point of quality. At this point, you can put the teachings of lean approach into use with Kanban system.
The ultimate goal of agile methods is to provide delivering...
Today, DZone Research released its Definitive Guide to Cloud Providers, which you can pick up for free here. This is DZone's largest research project to date, and it is designed to help you choose the best PaaS or IaaS solution for your specific needs. Specifically, our guide will help you answer these questions:
There are a number of factors to take into account while developing distributed software systems. If you donâ€™t even know what I am talking about in the first sentence then let me give you some insight, examples and for instances of what distributed systems are.
There are a number of factors to take into account while...
This post comes from Luke Bayas at the NuoDB Blog.
In this article we are going to talk about SQLAlchemy, a popular object relational mapper (ORM) for Python and how one could utilize it to interact with NuoDB.
Coming up this month there is a Virtual Developer Day for Java where you can watch educational tutorials on Java SE, Java EE and Java Embedded. The three tracks offer a lot of varied information:
52 New Features
in Java SE 8: A quick look at what's coming in the next big release.
JavaFX: Building JavaFX applications using Scene Builder and the JavaFX 2 API.
Expressions: Bringing a more functional approach to the Java language.
WebSocket 1.0 Presentation and Demo:"This rapidly adopted network protocol that is a foundational piece of the HTML5
standard gives Java EE developers the ability to add efficient, asynchronous bidirectional messaging into their web applications, enabling them to make their web applications more active and engaging."
Batch 1.0 Presentation and Demo: The first Java API standard for building batch applications.
Concurrency 1.0 and Demo: Adding asynchronous capabilities to Java EE 7 applications.
JAX-RS 2 Presentation: Looking at new features introduced into JAX-RS 2.0 for building web services.
JMS 2 Presentation: Highlights improvements to the Java Messaging Service.
Do you like coffee with
your dessert? Java and
the Raspberry Pi: How Java can be used on these hardware hobby boards.
Unleash the Power of
Oracle Java ME
Embedded 3.3: The
Raspberry Pi and the
Keil Board: Delve into the Orcale Java ME Embedded 3.3 platform.
Hacking with Java and
the Raspberry Pi
Tutorial:"a chance to see Java and JavaFX technologies running on a very
accessible embedded platform, as well as learn tips and tricks on how to easily get up and
running on the Raspberry Pi."
The date of the Virtual Developer Day changes depending on where you are watching from (remember to register):
Americas/Canada - Wednesday June 19, 2013
9:00 a.m. - 1:00 p.m. PDT
12:00 p.m. - 4:00 p.m. EDT
1:00 p.m. - 5:00 p.m. BRT
EMEA/Africa/Middle East - Tuesday June 25th, 2013
9:00:00 a.m. - 1:00pm BST
10:00:00 a.m. - 2:00 p.m.CEST
1:30:00 p.m. - 5:30:00 p.m. IST
12:00:00 p.m. - 4:00 p.m. MSK
08:00:00 a.m. - 12:00 p.m. Corresponding UTC (GMT)
From October 2013, the security releases for Java will follow the Oracle Critical Patch Update schedule. That's four security releases every year. (The currently scheduled dates for Java SE Critical Patch updates are 18 June 2013, 15 October 2013, 14 January 2014 and 15 April 2014).
Oracle has already taken steps to enhance security and give users more control with:
enhanced security warnings when executing applets
tighter security privileges for signed applets
discouraging the use of unsigned or self-signed applets
a new Java distribution called Server JRE for Java running on servers. It does not include the Java plug-in or auto-update. In the future it might not include libraries which are unnecessary for server use.
In addition, the Security Alert Program should see faster releases of unscheduled security fixes for severe vulnerabilities.