Wednesday, 16 August 2017

Five IT Certifications that will take your Tech Career a step forward


Five IT Certifications that will take your Tech Career a step forward


Want to know which IT certifications will enhance your job profile and will take your tech career a step forward? Here, we have brought the top five IT certifications to boost up your career:
1. Cisco Certified Network Associate (CCNA): CCNA certification validates a professional’s expertise in configuring, operating, and troubleshooting medium-level routed and switched networks. It also includes the validation and application of connections through distant sites using WAN.
Certification process: To become a CCNA certified, you need to pass a 90-minutes exam consisting of about 50-60 questions. The question format for this exam is multiple-choice, single-answer, drag and drop, fill in the blank and so on. The test costs around USD 295.
Job titles: Network engineer, network administrator, and systems administrator.
2. CompTIA A+: CompTIA A+ certification is an industrially recognized vendor-neutral certification designed to ensure knowledge and skills for entry-level IT professionals to configure, install, and maintain devices, PCs and software for end users, assemble components based on customer requirements, and so on.
Certification process: To become A+ certified, professionals have to pass two exams: 220-901 and 220-902. The question format for this exam is multiple choice and performance-based. The exam cost is approximately USD 200.
Job titles: In-home support specialist, desktop support technician, and help desk technician.
3. Network+: Network+ is a globally recognized credential designed to ensure technical knowledge required for foundation-level IT network practitioners to troubleshoot, manage, install, maintain, operate and configure basic network infrastructure, basic design principles, describe networking technologies, and adhere to wiring standards and use testing tools.
Certification process: To become a Network+ certified, professionals need to pass a 90-minutes exam consisting of 90 questions. The exam costs around USD 285.
Job titles: Helpdesk technician, information technology specialist, and information technology technician.
4. Certified Information Systems Security Professional (CISSP): ISC2 CISSP is an advanced-level certification designed to ensure skills and knowledge required for IT security professionals to engineer, implement, manage, and design the overall information security program to protect organizations from growing sophisticated attacks.
Certification process: The CISSP certification exam includes eight topics. It contains 250 questions which have to be completed in six hours. The exam cost is around USD 600.
Most common job titles: Information technology auditor, security analyst, information security analyst, and so on.
5. Microsoft Certified Systems Engineer (MCSE): Microsoft Certified Systems Engineer (MCSE) certification is designed to ensure proficiency and skills to use Windows Server, System Center, and other Microsoft technologies. The MCSE exam validates your ability to design systems and complex solutions, solve difficult problems requiring innovative resolutions, build and deploy, as well as operate, maintain and optimize Microsoft-based systems.
Certification process: The exam has a five-step process that contains various question formats such as multiple choice, drag-and-drop, and simulation problems. The exam costs around USD 150 regardless of the specialization.
Job titles: Systems administrator, field systems technician, and systems engineer.
So, what are you waiting for? Earning one of these top IT certifications will enhance your IT career and increase the job proficiency. Start your preparation now!



Monday, 19 June 2017

Other Modifiers for Members in Java

Other Modifiers for Members in Java

Certain characteristics of fields and/or methods can be specified in their declarations by the following keywords:

static Members: The declaration of static members is prefixed by the keyword static to distinguish them from instance members.
Static variables (also called class variables) only exist in the class they are defined in. They are not instantiated when an instance of the class is created. In other words, the values of these variables are not a part of the state of any object.
Static methods are also known as class methods. A static method in a class can directly access other static members in the class. It cannot access instance (i.e., non-static) members of the class, as there is no notion of an object associated with a static method.

final Members: A final variable is a constant, despite being called a variable. Its value cannot be changed once it has been initialized. This applies to instance, static and local variables, including parameters that are declared final.
A final variable of a primitive data type cannot change its value once it has been initialized.
A final variable of a reference type cannot change its reference value once it has been initialized, but the state of the object it denotes can still be changed.
A final method in a class is complete (i.e., has an implementation) and cannot be overridden in any subclass. Subclasses are then restricted in changing the behavior of the method.

abstract Methods: An abstract method does not have an implementation; that is, no method body is defined for an abstract method, only the method prototype is provided in the class definition. Its class is then abstract (i.e., incomplete) and must be explicitly declared as such. Subclasses of an abstract class must then provide the method implementation; otherwise, they are also abstract.

synchronized Methods: Several threads can be executing in a program. They might try to execute several methods on the same object simultaneously. If it is desired that only one thread at a time can execute a method in the object, the methods can be declared synchronized. Their execution is then mutually exclusive among all threads. At any given time, at the most one thread can be executing a synchronized method on an object. This discussion also applies to static synchronized methods of a class.

native Methods:Native methods are also called foreign methods. Their implementation is not defined in Java but in another programming language, for example, C or C++. Such a method can be declared as a member in a Java class definition. Since its implementation appears elsewhere, only the method prototype is specified in the class definition. The method prototype is prefixed with the keyword native. 

transient Fields: Objects can be stored using serialization. Serialization transforms objects into an output format that is conducive for storing objects. Objects can later be retrieved in the same state as when they were serialized, meaning that all fields included in the serialization will have the same values as at the time of serialization. Such objects are said to be persistent.
A field can be specified as transient in the class declaration, indicating that its value should not be saved when objects of the class are written to persistent storage.

volatile Fields: During execution, compiled code might cache the values of fields for efficiency reasons. Since multiple threads can access the same field, it is vital that caching is not allowed to cause inconsistencies when reading and writing the value in the field. The volatile modifier can be used to inform the compiler that it should not attempt to perform optimizations on the field, which could cause unpredictable results when the field is accessed by multiple threads.


Member Accessibility Modifiers in Java

Member Accessibility Modifiers in Java

By specifying member accessibility modifiers, a class can control what information is accessible to clients (i.e., other classes). These modifiers help a class to define a contract so that clients know exactly what services are offered by the class.
Accessibility of members can be one of the following:
  • public
  • protected
  • default (also called package accessibility)
  • private

A member has package or default accessibility when no accessibility modifier is specified. The member accessibility modifier only has meaning if the class (or one of its sub classes) is accessible to the client. Also, note that only one accessibility modifier can be specified for a member.

public Members: Public accessibility is the least restrictive of all the accessibility modifiers. A public member is accessible from anywhere, both in the package containing its class and in other packages where this class is visible. This is true for both instance and static members.(eg SuperclassA, SubclassB)

protected Members: A protected member is accessible in all classes in the package containing its class, and by all subclasses of its class in any package where this class is visible. In other words, non-subclasses in other packages cannot access protected members from other packages. It is less restrictive than the default accessibility(eg SuperclassA1, SubclassB1).

Default Accessibility for Members: When no member accessibility modifier is specified, the member is only accessible by other classes in its class's package. Even if its class is visible in another (possibly nested) package, the member is not accessible there. Default member accessibility is more restrictive than protected member accessibility.(eg SuperclassA2, SubclassB2)

private Members: This is the most restrictive of all the accessibility modifiers. Private members are not accessible from any other class. This also applies to subclasses, whether they are in the same package or not. Since they are not accessible by simple name in a subclass, they are also not inherited by the subclass. (eg SuperclassA3)




Friday, 9 June 2017

The five most desired certifications of 2017

The five most desired certifications of 2017


Being certified is the foolproof method to enhance your career a skills in the Information Technology industry. If you are one of those who considers certification as their career investment, then you must know which certifications are high in demand in 2017:



1. ISC)² CISSP: The (ISC)²’s CISSP certification is an industry recognized credential and is designed to certify the competency of IT professionals to design, engineer, implement, and manage the overall information security program of an organization. The CISSP exam tests the candidate’s understanding and knowledge in eight domains of the CISSP CBK, which are, Security and Risk Management, Asset Security, Security Engineering, Communications and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, and Software Development Security.

According to (ISC)², as of October 2016, only 89,932 people hold the certification worldwide. Earlier this month, the PayScale.com surveyed a group of 3,872 CISSPs and found that their average yearly salary ranged from USD 54,820 to USD 152,311 depending on the candidate’s location, years of experience and job title.

2. Certified in Risk and Information Systems Control (CRISC): The CRISC certification exam incorporates four major risk subject areas: identification, assessment, control monitoring and reporting, and response and mitigation. If the professional is focused on working in this area or if he has experience in the area and wants to be certified, he must go for CRISC exam.

According to the data from Global Knowledge’s 2017 IT Skills and Salary Survey, the average annual salary of Information Systems Control certified is USD 131,298.

3. Certified Information Systems Auditor (CISA): ISACA CISA certification exam is intended for candidates interested in information systems audit, control, and security. This exam validates candidate’s experience and knowledge in the field of information assets protection; IT governance and management; systems audit; control and security and so on. CISA certification is a great benchmark for those who provide valuable services to an organization’s IT, legal, and accounting departments.

CISA is among the highest-paying IT certifications based on the 2016 IT Skills and Salary Report conducted by Global Knowledge, with an average yearly salary of USD 112,931.

4. Project Management Professional (PMP): PMP Certification is every IT professional’s choice because it helps them apply their knowledge across a variety of industries. The skills of professionals to apply project management principles provides them a solid foot in almost every industry and opens the opportunity for management level positions. As the demand for skilled project managers has increased, candidates who hold the PMP credential are well positioned to provide the professional skills necessary to lead project teams and achieve successful project results.

As per the 7th edition of PMI’s Project Management Salary Survey, which polled over 30,000 project managers from 29 different countries, the median annual salary for a Project Management Practitioner was USD 92,000.

5. EC-Council Certified Ethical Hacker (CEH): Recent cyber attacks like ransomware, other cyber security threats have made various organizations to look for certified ethical hackers to penetrate networks and computer systems so that they find and fix security vulnerabilities. CEH Certification helps you in recognizing vulnerabilities and weaknesses within an organization or business’ network. The only difference is that instead of exploiting these security gaps, you will use the knowledge to safeguard an organization or business network and patch if there are any potential exposures.

According to the Payscale.com, the average annual salary of a Certified Ethical Hacker is USD 89,000.

So, get geared up now for any of the above-mentioned certification areas to enhance your career prospects and boost-up your pay-grade!


Monday, 29 May 2017

Arrays in Java

Arrays in Java

An array is a data structure that defines an indexed collection of a fixed number of homogeneous data elements. All elements in the array have the same data type. A position in the array is indicated by a non-negative integer value called the index. An element at a given position in the array is accessed using the index. The size of an array is fixed and cannot increase to accommodate more elements.
  • In Java, arrays are objects. Arrays can be of primitive data types or reference types.
  • In the first case, all elements in the array are of a specific primitive data type. In the second case, all elements are references of a specific reference type. 
  • Each array object has a final field called length, which specifies the array size, that is, the number of elements the array can accommodate. The first element is always at index 0 and the last element at index n-1, where n is the value of the length field in the array.
  • Simple arrays are one-dimensional arrays.
  • An array variable declaration has either the following syntax:<element type>[] <array name>;
    Or
    <element type> <array name>[];
    where <element type> can be a primitive data type or a reference type .

The declaration does not actually create an array. It only declares a reference that can denote an array object.
  • Constructing an Array: An array can be constructed for a specific number of elements of the element type, using the new operator. The resulting array reference can be assigned to an array variable of the corresponding type.
    <array name> = new <element type> [<array size>];
  • The array declaration and construction can be combined. <element type1>[] <array name> = new <element type2>[<array size>];
  • Initializing an Array: Java provides the means of declaring, constructing, and explicitly initializing an array in one declaration statement:
    <element type>[] <array name> = { <array initialize list> };
  • Using an Array: The whole array is referenced by the array name, but individual array elements are accessed by specifying an index with the [] operator. The array element access expression has the following syntax:
    <array name> [<index expression>]
  • Anonymous Arrays:
    <element type>[] <array name> = new <element type>[] { <array initialize list> };
    can be used to declare an array for example
    int[] myArray = new int[] {1, 4, 6, 8}; 
  • Multidimensional Arrays: An array element can be an object reference and arrays are objects, array elements can themselves reference other arrays. In Java, an array of arrays can be defined as follows:
    <element type>[][]...[] <array name>;
    or <element type> <array name>[][]...[];


Saturday, 27 May 2017

Java Source File Structure

Java Source File Structure

A Java source file can have the following elements that, if present, must be specified in the following order
  • An optional package declaration to specify a package name.
  • Zero or more import declarations. Since import declarations introduce class and interface names in the source code, they must be placed before any type declarations.
  • Any number of top-level class and interface declarations. Since these declarations belong to the same package, they are said to be defined at the top level, which is the package level.
  • The classes and interfaces can be defined in any order. Class and interface declarations are collectively known as type declarations. Technically, a source file need not have any such definitions, but that is hardly useful.


The Java 2 SDK imposes the restriction that at the most one public class definition per source file can be defined. If a public class is defined, the file name must match this public class. If the public class name is MyApp, then the file name must be MyApp.java.



The main() Method 
  • The Java interpreter executes a method called main in the class specified on the command line.
  • Any class can have a main() method, but only the main() method of the class specified to the Java interpreter is executed to start a Java application.
  • The main() method must have public accessibility so that the interpreter can call it.
  • It is a static method belonging to the class, so that no object of the class is required to start the execution.
  • It does not return a value, that is, it is declared void.
  • It always has an array of String objects as its only formal parameter. This array contains any arguments passed to the program on the command line.
  • All this adds up to the definition of the main() method:

public static void main(String[] args) { // ... }


Wednesday, 24 May 2017

Java Language Fundamentals

Java Language Fundamentals

Identifiers
  • A name in a program is called an identifier.
  • Identifiers can be used to denote classes, methods, variables, and labels.
  • In Java an identifier is composed of a sequence of characters, where each character can be either a letter, a digit, a connecting punctuation (such as underscore _), or any currency symbol (such as $, ¢, ¥, or £). However, the first character in an identifier cannot be a digit.
  • Identifiers in Java are case sensitive, for example, price and Price are two different identifiers.

Examples of Legal Identifiers: number, Number, sum_$, bingo, $$_100, mål, grüß 
Examples of Illegal Identifiers: 48chevy, all@hands, grand-sum

Keywords
  • Keywords are reserved identifiers that are predefined in the language and cannot be used to denote other entities.
  • All the keywords are in lowercase, and incorrect usage results in compilation errors.



Literals
  • A literal denotes a constant value, that is, the value a literal represents remains unchanged in the program. Identifiers can be used to denote classes, methods, variables, and labels.
  • Literals represent numerical (integer or floating-point), character, boolean or string values. In addition, there is the literal null that represents the null reference.

Examples of literals
  • Integer 2000, 0, -7 
  • Floating-point 3.14, -3.14, .5, 0.5
  • Character 'a‘, 'A‘, '0‘, ':‘, '-‘, ')' 
  • Boolean true, false 
  • String "abba“, "3.14“, "for“, "a piece of the action“

Comments
A program can be documented by inserting comments at relevant places. These comments are for documentation purposes and are ignored by the compiler.
Java provides three types of comments to document a program:
  • A single-line comment: // ... to the end of the line
  • A multiple-line comment: /* ... */
  • A documentation (Javadoc) comment: /** ... */

Primitive data types
Primitive data types in Java can be divided into three main categories:
  • Integral types— represent signed integers (byte, short, int, long) and unsigned character values (char)
  • Floating-point types (float, double)— represent fractional signed numbers
  • Boolean type (boolean)— represent logical values


Primitive data values are not objects. Each primitive data type defines the range of values in the data type, and operations on these values are defined by special operators in the language.

Variable declaration
A variable stores a value of a particular type. A variable has a name, a type, and a value associated with it. In Java, variables can only store values of primitive data types and references to objects. Variables that store references to objects are called reference variables.

Declaring and Initializing Variables
Variable declarations are used to specify the type and the name of variables. This implicitly determines their memory allocation and the values that can be stored in them.
  • char a, b, c; // a, b and c are character variables.
  • double area; // area is a floating-point variable.
  • boolean flag; // flag is a boolean variable.

A declaration can also include initialization code to specify an appropriate initial value for the variable:
  • int i = 10; // i is an int variable with initial value 10.
  • long big = 2147483648L; // big is a long variable with specified initial value.

Object Reference Variables, An object reference is a value that denotes an object in Java. Such reference values can be stored in variables and used to manipulate the object denoted by the reference value. Before we can use a reference variable to manipulate an object, it must be declared and initialized with the reference value of the object.
  • Pizza yummyPizza; // Variable yummyPizza can reference objects of class Pizza.
  • Hamburger bigOne; // Variable bigOne can reference objects of class Hamburger
  • Pizza yummyPizza = new Pizza("Hot&Spicy"); // Declaration with initializer.


Monday, 22 May 2017

Basic elements of a Java Program

Basic elements of a Java Program

The basic elements of a Java application are introduced in this post.

Basic elements of a Java Program - Class
A class denotes a category of objects, and acts as a blueprint for creating such objects. A class models an abstraction by defining the properties and behaviors for the objects representing the abstraction. An object exhibits the properties and behaviors defined by its class. The properties of an object of a class are also called attributes, and are defined by fields in Java. A field in a class definition is a variable which can store a value that represents a particular property.  The behaviors of an object of a class are also known as operations, and are defined using methods in Java. Fields and methods in a class definition are collectively called members.

Basic elements of a Java Program - Object
The process of creating objects from a class is called instantiation. An object is an instance of a class. The object is constructed using the class as a blueprint and is a concrete instance of the abstraction that the class represents. An object must be created before it can be used in a program. In Java, objects are manipulated through object references. Each object has a unique identity and has its own copy of the fields declared in the class definition.

Instance Member
The fields of an object are called instance variables. The values of the instance variables in an object comprise its state. Two distinct objects can have the same state, if their instance variables have the same values. The methods of an object define its behavior. These methods are called instance methods. It is important to note that these methods pertain to each object of the class. Instance variables and instance methods, which belong to objects, are collectively called instance members.

Method invocation
Objects communicate by message passing. This means that an object can be made to exhibit a particular behavior by invoking the appropriate operation on the object. In Java, this is done by calling a method on the object using the dot '.' operator.  The dot '.' notation also can be used with a reference to access fields of an object.

Static member
In some cases, certain members should only belong to the class, and not be part of any object created from the class. Such a field is called a static variable. It belongs to the class, and not to any object of the class. A static variable is initialized when the class is loaded at runtime. Similarly, a class can have static methods that belong only to the class, and not to any objects of the class.  Static variables and static methods are collectively known as static members, and are distinguished from instance members in a class definition by the keyword static in their declaration.

Java Program
A Java program is a collection of one or more classes, with one of them containing the program's execution starting point. A Java source file can contain more than one class definition. The Java 2 SDK enforces the rule that at the most one class in the source file has public accessibility. The name of the source file is comprised of the name of this public class with .java as extension. Each class definition in a source file is compiled into a separate class file, containing Java byte code. The name of this file is comprised of the name of the class with .class as an extension. All programs must be compiled before they can be run. 
An application is what is normally called a program: source code that is compiled and directly executed. In order to create an application in Java, the program must have a class that defines a method called main. The main() method in the class is the starting point for the execution of any application.

public static void main(String [] args)
The main() method has public accessibility, that is, it is accessible from any class. The keyword static means the method belongs to the class. The keyword void means the method does not return any value. The parameter list, String[] args, is an array of strings used to pass information to the main() method when the application is started.


Wednesday, 17 May 2017

Introduction to Java

Introduction to Java

Java is a general-purpose computer programming language that is concurrent, class-based and object-oriented. Java is intended to let application developers "write once, run anywhere" (WORA) meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. 
Java applications are typically compiled to bytecode that can run on any Java virtual machine (JVM) regardless of computer architecture. As of 2016, Java is one of the most popular programming languages in use, particularly for client-server web applications. 
Java was originally developed by James Gosling at Sun Microsystems (later acquired by Oracle Corporation) and released in 1995 as a core component of Sun Microsystems' Java platform. The language derives much of its syntax from C and C++, but it has fewer low-level facilities than either of them.

Principles
There were five primary goals in the creation of the Java language  
  1. It must be "simple, object-oriented, and familiar".
  2. It must be "robust and secure".
  3. It must be "architecture-neutral and portable".
  4. It must execute with "high performance".
  5. It must be "interpreted, threaded, and dynamic".

Java Virtual Machine (JVM)
Oracle provides a set of programming tools such as javac, java and others in a bundle called Java SDK(JDK) for different platforms (Windows, Linux, etc)
Oracle also provides a runtime bundle with just the JVM (Java Virtual machine) when programming tools are not needed.

JVM is a program that runs on a given platform and takes the bytecode as input and interprets them just as if it were a physical processor executing machine code. javac compiler transforms the Java language source code to bytecode that runs in the JVM.

With most programming languages you either compile or interpret a program so that you can run it on your computer. The Java programming language is unusual in that a program is both compiled and interpreted. With the compiler, first you translate a program into an intermediate language called Java bytecodes – the platform independent codes interpreted by the interpreter on the Java platform. The interpreter parses and runs each Java bytecode instruction on the computer. Compilation happens just once; interpretation occurs each time the program is executed.




You can think of the Java bytecodes as the machine code instructions for the Java Virtual Machine(Java VM). Every JVM interpreter, whether it’s a development tool or a web browser that can run applets, is an implementation of the Java VM.
Java byte codes help make “write once, run anywhere” possible. You can compile your program into bytecodes on any platform that has a Java compiler. The bytecodes can then be put on any implementation of the Java VM. That means that as long as a computer has a Java VM, the same program written in the Java programming language can run on Windows, a Solaris workstation or an iMac.


Monday, 15 May 2017

What is MongoDB?

What is MongoDB?

MongoDB is a document database with the scalability and flexibility that you want with the querying and indexing that you need
MongoDB is a free and open-source cross-platform document-oriented database program. Classified as a NoSQL database program, MongoDB uses JSON-like documents with schemas. MongoDB is developed by MongoDB Inc. and is free and open-source, published under a combination of the GNU Affero General Public License and the Apache License.

Document Database
A record in MongoDB is a document, which is a data structure composed of field and value pairs. MongoDB documents are similar to JSON objects. The values of fields may include other documents, arrays, and arrays of documents.
{
name :  “Ravi” field: value
age: 26     field: value
}

Key Features

High Performance
MongoDB provides high performance data persistence. In particular, Support for embedded data models reduces I/O activity on database system.

Rich Query Language
MongoDB supports a rich query language to support read and write operations including Create, Retrieve, Update, Delete (CRUD) 

High Availability
MongoDB’s replication facility, called replica set, provides:
automatic failover 
data redundancy.
A replica set is a group of MongoDB servers that maintain the same data set, providing redundancy and increasing data availability.

Horizontal Scalability
MongoDB provides horizontal scalability as part of its core functionality:
Sharding distributes data across a cluster of machines.
MongoDB 3.4 supports creating zones of data based on the shard key. In a balanced cluster, MongoDB directs reads and writes covered by a zone only to those shards inside the zone.

Support for Multiple Storage Engines
MongoDB supports multiple storage engines, such as:
WiredTiger Storage Engine and
MMAPv1 Storage Engine.

Indexing
Fields in a MongoDB document can be indexed with primary and secondary indices.

File storage
MongoDB can be used as a file system with load balancing and data replication features over multiple machines for storing files.


Server-side JavaScript execution
JavaScript can be used in queries, aggregation functions (such as MapReduce), and sent directly to the database to be executed.



Thursday, 11 May 2017

Introduction to Node.js

Introduction to Node.js 



Node.js is a JavaScript runtime built on Chrome's V8 JavaScript engine. Node.js uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Node.js' package ecosystem, npm, is the largest ecosystem of open source libraries in the world.

Node.js is an open source, cross-platform runtime environment for developing server-side and networking applications. Node.js applications are written in JavaScript, and can be run within the Node.js runtime on OS X, Microsoft Windows, and Linux.


Features of Node.js
Following are some of the important features of Node.js 

  • Asynchronous and Event Driven − All APIs of Node.js library are asynchronous, that is, non-blocking. It means a Node.js based server never waits for an API to return data. The server moves to the next API after calling it and a notification mechanism of Events of Node.js helps the server to get a response from the previous API call.
  • Fast − Being built on Google Chrome's V8 JavaScript Engine, Node.js library is very fast in code execution.
  • Single Threaded and Highly Scalable − Node.js uses a single threaded model with event looping. Event mechanism helps the server to respond in a non-blocking way and makes the server highly scalable. Node.js uses a single threaded program and the same program can provide service to a much larger number of requests than traditional servers like Apache HTTP Server.
  • No Buffering − Node.js applications never buffer any data. These applications simply output the data in chunks.
  • License − Node.js open source and is released under the MIT license

Where to Use Node.js
Node.js can be used in the following 
  • I/O bound Applications
  • Data Streaming Applications
  • Data Intensive Real-time Applications (DIRT)
  • JSON APIs based Applications
  • Single Page Applications



Wednesday, 10 May 2017

3 COMPTIA CERTIFICATION IN DEMAND

3 COMPTIA CERTIFICATION IN DEMAND



In 2016, more than 5.2 million IT jobs contributed to the U.S. economy with an additional 2 million new job postings throughout the year. Peruse those posts, and you’ll find three CompTIA certifications specifically cited as job requirements in thousands of listings: CompTIA Security+CompTIA A+ and CompTIA Network+.
CompTIA Security+
 CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.
In response to CompTIA’s IT Career Insights Survey, 93 percent of IT professionals said they regularly work with security and cyber security technology. Even more importantly, according to CompTIA’s Common IT Employability Skills study, 62 percent of hiring managers in the United States indicated that candidates “must have” these skills to be considered for the job. Hands-on and strategic involvement with security technology makes CompTIA Security+ certification, as well as the forthcoming CompTIA Cybersecurity Analyst (CSA+) certification, a vital part of an IT career, whether you want to enhance your skills for an existing job or apply for a new one.
CompTIA A+
It’s a known fact that IT training helps employees advance in their careers. The CompTIA A+ certification is perfect for individuals new to the field and IT professionals in transition. Because it tests a candidate’s knowledge on all fields of information technology and not on one particular domain, the CompTIA A+ certification is typically given more weight than other vendor certifications.
More than 23,500 job postings in 2016 required applicants to have CompTIA A+ certification. Validating the IT skills required by the most common hardware, software and operating systems while remaining vendor neutral, CompTIA A+ has long been a  foundational certification for IT professionals.
CompTIA Network+
Finally, more than 18,000 jobs posted in 2016 required CompTIA Network+ certification, a vendor-neutral, worldwide networking accreditation that validates an IT professional’s ability to design, configure, manage and troubleshoot both wired and wireless networks. Considering 92 percent of IT professionals in the United States worked with this technology in 2016, CompTIA Network+ is a valuable certification for almost any job applicant.
Although most online job postings do not specifically list IT certification requirements, employers know IT pros with CompTIA certifications are more capable of succeeding in their careers.
When accreditations are preferred, CompTIA Security+ is the fourth-most-requested certification in job postings, behind Certified Information Systems Security Professional, Project Management Professional, and Cisco IT certifications. CompTIA A+ and Network+ ranked 8th and 11th, respectively, according to the Burning Glass Technologies Labor Insights study.


Clearly, CompTIA professional certifications set job candidates apart in a competitive and constantly growing job market—one the U.S. Bureau of Labor Statistics expects to grow 12 percent in the network and computer systems industry over the next seven years.

Thursday, 4 May 2017

Domain Model in Hibernate

Domain Model in Hibernate

The application domain model is the central character in an ORM. Domain Model are the classes we would be mapping in our application. These domain model classes needs to follow the Plain Old Java Object (POJO) / JavaBean programming model in order to make Hibernate works best.
Applications using Hibernate uses its proprietary XML mapping file format for this purpose. With JPA, most of this information is now defined in a way that is portable across ORM/JPA providers using annotations and/or standardized XML format.

Mapping types
Hibernate understands both the Java and JDBC representations of application data. The ability to read/write this data from/to the database is the function of a Hibernate type. A type, is an implementation of the org.hibernate.type.Type interface.
To help understand the type categorizations, we take an example of a simple table and domain model that we wish to map.

create table ContactInfo (
    id integer not null,
    firstName varchar(255),
    lastName varchar(255),
    middleName varchar(255),
    notes varchar(255),
    starred boolean not null,
    website varchar(255),
    primary key (id)
)


@Entity(name = "ContactInfo")
public static class ContactInfo {

    @Id
    private Integer id;
    private Name name;
    private String notes;
    private URL website;
    private boolean starred;

    //Getters and setters
}



@Embeddable
public class Name {

    private String firstName;
    private String middleName;
    private String lastName;

    // getters and setters
}


In the broadest sense, Hibernate categorizes types into two groups:
  • Value types
  • Entity types


Value types
A value type is a piece of data that does not define its own lifecycle. It is, owned by an entity, which defines its lifecycle. All the state of an entity is made up entirely of value types. These state fields or JavaBean properties are termed persistent attributes. The persistent attributes of the ContactInfo class are value types.

Value types are further classified into three sub-categories:

Basic types
In mapping the ContactInfo table, all attributes except for name would be basic types.

Embeddable types
The name attribute is an example of an embeddable type.

Collection types
Collection types are also a distinct category among value types.

Entity types
Entities, exist independently of other objects whereas values do not. Entities are domain model classes which correlate to rows in a database table, using a unique identifier. Entities exist independently and define their own lifecycle. The ContactInfo class is an example of an entity. 

Monday, 1 May 2017

Hibernate Architecture Overview

Hibernate Architecture Overview

Hibernate, is an ORM solution, which sits between the Java application data access layer and the Relational Database. The Java application makes use of the Hibernate APIs to load, store, query, etc its domain data. Hibernate implements the Java Persistence API (JPA) specifications. 


SessionFactory (org.hibernate.SessionFactory)
SessionFactory  is a thread-safe representation of the mapping of the application domain model to a database. SessionFactory acts as a factory for org.hibernate.Session instances. The EntityManagerFactory is the JPA equivalent of a SessionFactory.

A SessionFactory is very expensive to create, so, for any given database, the application should have only one associated SessionFactory. The SessionFactory maintains services that Hibernate uses across all Sessions such as second level caches, connection pools, transaction system integrations, etc.

Session (org.hibernate.Session)
A single-threaded, short-lived object conceptually modeling a "Unit of Work". In JPA nomenclature, the Session is represented by an EntityManager.
The Hibernate Session wraps a JDBC java.sql.Connection and acts as a factory for org.hibernate.Transaction instances. 

Transaction (org.hibernate.Transaction)
A single-threaded, short-lived object used by the application to demarcate individual physical transaction boundaries. 


Thursday, 27 April 2017

Spring AOP – Advice

Spring AOP – Advice

Spring AOP Advice is the action taken by an aspect at a particular join point. Different types of advice include 
  • Around advice
  • Before advice
  • After advice

Many AOP frameworks, including Spring, model an advice as an interceptor, maintaining a chain of interceptors around the join point.

Types of advice:
  • Before advice: Advice that executes before a join point, but which does not have the ability to prevent execution flow proceeding to the join point.

  • After returning advice: Advice to be executed after a join point completes normally.

  • After throwing advice: Advice to be executed if a method exits by throwing an exception.

  • After (finally) advice: Advice to be executed regardless of the means by which a join point exits, normal or exceptional return.

  • Around advice: Advice that surrounds a join point such as a method invocation. This is the most powerful kind of advice. Around advice can perform custom behavior before and after the method invocation. It is also responsible for choosing whether to proceed to the join point or to shortcut the advised method execution by returning its own return value or throwing an exception.

Tuesday, 25 April 2017

Aspect Oriented Programming with Spring

Aspect Oriented Programming with Spring

Aspects enable the modularization of concerns such as transaction management that cut across multiple types and objects. One of the key components of Spring is the AOP framework. While the Spring IoC container does not depend on AOP, meaning you do not need to use AOP if you don't want to, AOP complements Spring IoC to provide a very capable middleware solution. Aspect-Oriented Programming requires breaking down program logic into distinct parts called concerns. 

The functions that span multiple points of an application are called cross-cutting concerns and these cross-cutting concerns are conceptually separate from the application's business logic. Examples of aspects are logging, auditing, declarative transactions, security, caching, etc. Spring AOP module provides interceptors to intercept an application. For example, when a method is executed, you can add extra functionality before or after the method execution.


AOP is used in the Spring Framework to

Provide declarative enterprise services, especially as a replacement for EJB declarative services. 
Allow users to implement custom aspects, complementing their use of OOP with AOP.

AOP Terminologies

Before we start working with AOP, let us become familiar with the AOP concepts and terminology. These terms are not specific to Spring, rather they are related to AOP.
Aspect: a modularization of a concern that cuts across multiple classes. Transaction management is a good example of a crosscutting concern in Java EE applications. In Spring AOP, aspects are implemented using regular classes  or regular classes annotated with the @Aspect annotation.
Join point: a point during the execution of a program, such as the execution of a method or the handling of an exception. In Spring AOP, a join point always represents a method execution.
Advice: action taken by an aspect at a particular join point. Different types of advice include "around," "before" and "after" advice
Pointcut: a predicate that matches join points. Advice is associated with a pointcut expression and runs at any join point matched by the pointcut.
Introduction: declaring additional methods or fields on behalf of a type. Spring AOP allows you to introduce new interfaces to any advised object. 
Target object: object being advised by one or more aspects. Also referred to as the advised object. 
AOP proxy: an object created by the AOP framework in order to implement the aspect contracts. In the Spring Framework, an AOP proxy will be a JDK dynamic proxy or a CGLIB proxy.
Weaving: linking aspects with other application types or objects to create an advised object. This can be done at compile time, load time, or at runtime. Spring AOP, like other pure Java AOP frameworks, performs weaving at runtime.


Related Posts Plugin for WordPress, Blogger...