Saturday, April 9, 2011

Untitled

ADF Code Corner sample #75: How-to select multiple parent table 

rows and synchronize a detail table with the combined result


Using dependent View Objects in ADF Business Components makes it easy to create 
a master-detail behavior between two ADF bound ADF Faces tables. However, things 
are different if the parent table allows multiple row selection and the detail table is 
supposed to show the combined details for the selected rows. The use case of multiple 

parent rows is covered in this article using bind variables. More>>

Posted via email from Mahesh Kamath's Posterous

Software fraud, phony electronic parts pose serious security risks, expert says

SAN FRANCISCO -- A supply chain management expert studying ways companies can crack down on cheaply made imitation parts and software is urging software makers and manufacturers of electronic devices to develop better technologies to weed out fraudulent items. The problem is extremely serious, because fake items pose a serious security threat to consumers and businesses.

There are some ways to address supply chain risk management. But few technologies exist to guard against the manufacturing of phony microchips and other components that could end up in a myriad of devices, including smartphones, automobiles or worse: the space shuttle. Speaking at the Security B-Sides conference in San Francisco, Monday, Hart Rossman, vice president and CTO for cyber programs at McLean, Va.-based Science Applications International Corp. (SAIC), cited an internal study conducted by NASA, which found that a number of counterfeit electronics that it aboard the space shuttle into outer space.

You may 
have a 
situation 
where a very inexpensive 
part causes 
the failure 
of a 
multibillion dollar system.

Hart Rossman
Vice president and CTOSAIC

"If you ship a component that is counterfeit and it goes into an automobile, it can be recalled, but what if you ship a counterfeit component that goes into a space shuttle?" Rossman asked. "It can be very difficult to determine if something is genuine or an unauthorized copy."

The lack of focus on supply chain security is flooding the market with fraudulent parts and devices. The problem is a growing threat to the consumer electronics industry, which is concerned that malware can be placed on digital music players, laptops and smartphones at some point in the supply chain. While it poses major privacy issues for consumers and a serious security risk if the malware steals data, it also can be costly to consumer electronics companies that have to deal with the fall out by providing recourse -- either a new device or compensation -- to potentially thousands of customers.

The cyber supply chain is made up of a mixture of hardware and software vendors that are connected via software development kits or some kind of network backbone, Rossman said. It is made up of businesses that create devices like smartphones and computer systems as well as companies that heavily use information technology for products and services, such as the pharmaceutical industry.

Fraudulent parts can cause catastrophic damage, but even pose significant monetary damage to businesses, Rossman said. The problem stems from a lack of dialogue between manufacturers and their partners because much of the information contains proprietary data, highly safeguarded by companies and the manufacturers they deal with. "Record keeping is nonexistent or incongruous at best," Rossman said.

read more>>                                                                                                                                                                                                  courtesy : techtarget.com 

Posted via email from Mahesh Kamath's Posterous

Saturday, June 26, 2010

Hosted Services Comparison Whitepaper - Google vs Microsoft

Hosted Services Comparison Whitepaper - Google vs Microsoft.pdf (927 KB)
View this on posterous

Posted via email from Mahesh Kamath's Posterous

Developer’s Guide to BlackBerry Java Application Location-Based Services

Featured White Paper on TheServerSide.com

BlackBerry Java Application Location-Based Services
Sponsored by: BlackBerry

Location-based services allow developers to create BlackBerry® applications to retrieve the GPS location of BlackBerry devices. This developer guide offers detailed instructions on how to implement location-based services into BlackBerry applications and how to choose which GPS mode to use for specific types of applications.

Download this white paper to learn how to develop Java applications with location-based services by following these actions:

  • Specifying the GPS mode
  • Retrieving a location provider
  • Making a GPS request that is based on the frequency of the GPS fix
  • Retrieving the GPS location of a BlackBerry device
  • Implementing BlackBerry Maps
Download Here


Posted via email from Mahesh Kamath's Posterous

Sunday, May 16, 2010

A FREE cloud based version of Microsoft Office is coming…

Microsoft is finally seeing the light (or cloud I should say) and will be making available (for FREE) a browser based (light weight) version of Word, Excel, Powerpoint and One Note to members of its free Windows Live online service. It is my understanding that if you have a Windows Live account (i.e. Hotmail account) you will be able to access these applications for FREE in your web browser (including Firefox). It is anticipated to be available sometime next year (2010) as Microsoft Office 2010 is rolled out.  It is currently unknown if these cloud apps will be ad supported or not. more>>

Posted via email from Mahesh Kamath's Posterous

Sunday, April 4, 2010

The future of BPM, SOA and CLOUD trends.

SearchSOA.com recently caught up with Richard Soley, CEO of the Object Management Group (OMG) to get a sense of where IT is headed. Soley discussed a variety of issues, including the future of IT, cloud and SOA. He said BPM and SOA can be tricky to integrate together, but are a very useful pair.

"BPM has focused more on the process that implements the capabilities of the organization," said Soley. "SOA has focused on the way that we architect those into a solution that integrates the enterprise. We at OMG think those are very complementary concepts."

One issue now coming to the forefront is aligning IT with the business. read more>>

videocast

Courtesy : Techtarget

Posted via email from Mahesh Kamath's Posterous

Monday, March 29, 2010