Category

Software Development

Categories

Why Software Quality Control Is Important

Why Software Quality Control Is Important

Software Reliability We live in a society where our dependency on technology is rapidly increasing each day. IoT should make our life easier, at least that’s the idea, and honestly, when most of the people are busy with their careers, having an app that will save you...

read more
Custom Infinity Scroll

Custom Infinity Scroll

This blog is written for everyone, but my recommendation for the reader is to have: HTML – basic knowledge CSS – basic knowledge JavaScript – good knowledge AngularJS Framework – good knowledge Npm & Bower – basic knowledge Text editor – basic knowledge To develop...

read more
“instanceof”, Why And How To Avoid It In Code

“instanceof”, Why And How To Avoid It In Code

The java “instanceof” operator is used to test whether the object is an instance of the specified type (class or subclass or interface). It is also known as type comparison operator because it compares the instance with type. It returns either true or false. If we...

read more
Documentum Knowledge Sharing Article Published

Documentum Knowledge Sharing Article Published

My article for the EMC Proven Professional's 2015 Knowledge Sharing Contest, A Language Translation Service for Documentum, has been published!  You can read the article for yourself on the ECN in the Proven Professionals' area (if you have access), or on my personal...

read more
Managing Site URLs

Managing Site URLs

A few years ago I started a project with a new customer. When I was granted access to their DEV, QA, and PROD environments I was given a bookmark file that contained all of the URLs I would need to manage and administer their systems (for example: DA, Webtop, and...

read more
Test for and Patch the Heartbleed Bug

Test for and Patch the Heartbleed Bug

OpenSSL versions 1.0.1 through 1.0.1f (inclusive) are compromised with a vulnerability that makes it possible to steal information. Patched versions of the OpenSSL may have been back ported to the "built on" date newer or equal to April 2014 should be a good indicator...

read more
Create a Self-Extracting Installer in Linux

Create a Self-Extracting Installer in Linux

Ultimately many would want to write complex RPMs to install software packages, however, those who are accountable for writing such packages may agree that this task may be cumbersome and impractical. Where the RPM may accomplish the goal of wrapping an application in...

read more
Spring Managed Alfresco Custom Activiti Java Delegates

Spring Managed Alfresco Custom Activiti Java Delegates

I recently needed to make a change to have Alfresco 4's Activiti call an object managed by Spring instead of a class that is called during execution.  Couple of reasons for this: A new enhancement was necessary to access a custom database table, so I needed to inject...

read more
WordPress Contributors Upload Plugins

WordPress Contributors Upload Plugins

My previous post, "Allow WordPress Users to Upload Images" discussed the use of the functions.php file to implement capabilities to the contributors' role that isn't there by original design. As the functions.php file is part of a Wordpress theme, and if an alternate...

read more

ArkCase: Introduction to Data Access Control

Background ArkCase is a framework for developing case management applications. Data Access Control ensures each user sees only records they are authorized to see, and are prevented from seeing unauthorized records.  Data access control is applied to individual...

read more

Writing a Framework is Not Like Developing an Application!

ArkCase is both a framework and an application.  As a framework, ArkCase provides a scaffolding to write case management applications tailored to custom-fit a specific customer.  As an application, ArkCase provides pre-built web application archives (WAR files)...

read more

Art and Computer Science

I picked up a book in Armedia's technical library by accident the other day, but have come to really appreciate the rewards of that serendipitous event. I first grabbed the book because of its author, Don Knuth, is a well-known innovator in the computer science world....

read more

ArkCase: How I Learned to Make Modules be Self-Sufficient

A while back I said Armedia was investing in the next generation ArkCase.  I promised occasional updates.  Since then I've written a few technical stories (CLICK HERE to view all of our ArkCase blog posts).  Today I want to describe how we've started to achieve...

read more

Spring MVC – setting JSON date format

Spring MVC's message conversion feature is the bomb.  I love it; I wish I'd started using it long ago.  Just make sure your JSON fields match your POJO property names, and your MVC controller includes a POJO parameter or return value.  Then Spring MVC auto-converts...

read more

VMWare Hyperic HQ Agent Automated Install and Configuration

An enterprise size company should require enterprise level software to meet the demands of it's infrastructure and user community. Software vendors offer enterprise class applications and solutions, however, miss the mark when deploying agents to clients. A case may...

read more

Mule Integration with Spring: A New Approach

I've written about using Mule with Spring on my personal blog.  In this article I described how to integrate Mule into an existing Spring MVC application. That approach involved configuring the web.xml file to setup a Mule context: <listener>...

read more

Mule and Activiti: Happy Together

Activiti out-of-the-box supports Mule tasks. When Activiti encounters a Mule task, it launches the configured Mule flow. This integration is exactly why my new project uses Mule in the first place. But Activiti also supports execution and task listeners: code that...

read more

ArkCase: Pluggable Authentication Modules with Spring

Over the past several months, I have written several blogs about my project, the ArkCase framework. In this post, I will cover how we have gotten ArkCase to work with Spring Security. It is important to note that each organization has their own user directory, their...

read more

The Sunny Side of Tika

One of the great joys of development comes when you learn about a program making your development task very simple.  Apache Tika is one of those programs, and before I even begin to talk about Tika, I have to tip my hat to the developers.  Thank you very much for...

read more

Setting Up a Virtual Environment

It wasn't that long ago when a development environment required multiple physical computers to perform tasks from the mundane to the most sophisticated. While the virtualization of these environments became more adopted, software vendors introduced new products and...

read more

How do you Approach your Code?

Building software is more like creating a work of art, it requires creativity in design and ample craftsmanship to complete. Don Wells made this statement in his essay Agile Software Development: A gentle introduction at www.agile-process.org. He made the statement in...

read more

Unable to open any pages in SharePoint 2010

I have SharePoint 2010 installed locally on my laptop where I do my development. I don't develop for SharePoint all the time so there are gaps between when I might be looking at my local SharePoint. Getting back to SharePoint development I attempted to deploy my new...

read more

SQL Server Management Studio Freeze

In this blog I document an issue with SQL Server Management Studio freezing and what I did to resolve the issue. So while trouble-shooting a SharePoint issue (that's another blog) I found that the SQL Server Management Studio froze as soon as it loaded and I could...

read more

Understanding Spring Security – Part 4 – ACL Security

Spring Security also provides domain object level security in addition to the other types of security discussed in this Spring Security blog series. In simple terms, ACL provides a way to specify permissions based on a combination of role, business object (referred to...

read more

Understanding Spring Security – Part 1 – Introduction

Spring Security, formerly known as Acegi Security, is an open source security provider that is used extensively in Java based web applications. Due to its power and ability to be customized, Spring Security has evolved itself into the de-facto standard for securing...

read more

Two Approaches to Source Code Management (SCM)

I’ve been thinking about source code management, because I recently encountered two very different approaches to it. Let me begin with a quick overview of some key source code management terms and concepts. First, what do I mean by source code management (SCM)? SCM is...

read more

Printing From a SharePoint Visual Web Part

I recently built a SharePoint (SP) Visual Web Part (VWP) with two calendar controls and a literal control. The calendar controls are used to filter the content of a specific list and the results are displayed in the literal control. The literal control only has the...

read more

Why Open Source?

To really be able to answer the question “Why Open Source?” you must have a thorough understanding of the different benefits of open source software that businesses can experience. Today, there are open source office solutions available for almost every common type of...

read more

The CRASH Report

Cast software, the maker of software quality tools, released their second annual CRASH (Cast Report on Application Software Health) report in December. The report examined the "health" of world-wide software applications by examining the source code of 745...

read more

The Fast/Good/Cheap Rule of Software Development

Triangles have been a staple of mathematics, architecture and engineering for centuries. They have also become important in software development by way of a project management concept. You may have heard of the "Fast/Good/Cheap" rule. This rule uses a triangle to...

read more

I’m in eRoom, Get Me Out of Here!

[turns up amplifier, cranks up volume to 11, puts Huey Lewis and the News vinyl on record player....] I start up Visual Studio 6.0 and settle down to some nostalgic programming with Visual Basic (VB) 6.  Ah, college memories come flooding back and strangely not many...

read more

Top 25 Programming Errors

The 2011 CWE/SANS Top 25 Most Dangerous Software Errors report was published by the SANS Institute and MITRE in June (cwe.mitre.org/top25).  The report leveraged the SANS Institute's Tops 20 attack vectors (www.sans.org/top20) and MITRE's Common Weakness Enumeration...

read more

Using SharePoint Designer 2010 to Add Custom Buttons

Sharepoint Designer  2010 provides a great quick way to add simple actions to your SharePoint application. I have a project that I wanted to add a couple buttons that would allow the user to navigate away from a "Drop-Off" library to the libraries where files are...

read more

New and improved method for extracting JavaScript from HTML

A few weeks back, I wrote about using HTML5 custom data attributes as an enabling mechanism for extracting JavaScript from HTML pages. Turns out that approach has one significant drawback: HTML attributes are not suitable for storing arbitrary data.  Specifically, we...

read more

JSP Pages, Do not get too used to c:out!

I was always one to go ahead and use <c:out> to display model data in my JSP pages.  Never had a reason not to!  Well, I recently had a reason…   As I mentioned in my last post, I am working on a web application that uses several jQuery libraries – another...

read more

A pattern for extracting JavaScript from HTML

When I wrote about separation of concerns in webapps, I said I would consider how to apply separation of concerns in my project.  This post is a progress report!  I have tried this pattern on several pages and so far, all is well. Step 1 is obvious: just extract all...

read more

SharePoint 2010 – REST Atom Service and JAVA, part 2

This is the second of two blogs where I demonstrate how to use the openCMIS library from a JAVA client to connect to a CMIS enabled SharePoint site through the REST Atom service of SharePoint. My previous blog “SharePoint 2010 – REST Atom Service.” provided...

read more

Sharepoint 2010: REST Atom Service and JAVA

  This is the first of two blogs where I demonstrate how to use the openCMIS library from a JAVA client to connect to a CMIS enabled SharePoint site through the REST Atom service of SharePoint. The “lessons learned” and tips I include come from examining MSDN and...

read more

Webapps and Separation of Concerns

Separation of concerns is a big deal in software engineering.  Program structures should be nicely organized, such that distinct tasks are handled by distinct program elements.  In other words: no business logic wrapped up in our SQL statements; no data access in our...

read more

Oracle and Java = Goodness

Two exciting announcements from Oracle the last few days: JCP.Next - Oracle Proposes Changes to JCP: Enforced transparency (open mailing lists, open issue trackers); and greater throughput (more frequent JSR updates, and deactivating JSRs when they stop making...

read more

The Browser is the VM

Just like thousands (millions?) of others, I spent the last 9 years writing services for Web applications.  I always concentrated on the server side, and never took the browser seriously as a software development platform.  I assume I'm not alone, given the prevalence...

read more

Beginner Thoughts on Alfresco Architecture

If you asked me three months ago if I enjoy developing to Alfresco’s repository and Share UI (specifically Enterprise 3.3.3), it would have been a frustrated “NO…” -- Not frustration about WANTING to learn a new product, since that is always exciting and challenging,...

read more

More Thoughts on Data

In my previous blog, Data, the Neglected Part of Content Management,  I discussed the importance of structured data within a cms. Getting a good structured data design to compliment the design of the overall content management solution can be dirty work; not quite...

read more

Speaking IBM FileNet

In my years of working in the content management space I've experienced the challenges of switching horses, sorry I mean platform vendors more than once. Terminology aside, it's hard to quickly understand let alone master a new platform simply because how each...

read more

So long, farewell, auf Wiedersehen, eRoom

A simple goal – “export, transform, load” – the destination is a matter of choice. EMC eRoom is going away.  It has been marked as End of Life (EOL) so what next?  EMC Documentum have 2 options: EMC Documentum Collaboration Services; EMC Documentum Centerstage. ...

read more

Doneness!

‘Tis the season for the big sales kickoffs, goal communication, quota setting and the inevitable fudding and jockeying that goes with that. We at Armedia are, of course, not much different and have been dutifully working our list for a while. All roads therefore lead...

read more

Other People of Case Management

For the last few blog posts, we have discussed answers to different aspects of the question "What is Case Management". With the several roles that are involved in controlling and managing components of a Case Management system. Lets discuss a few more: A couple more...

read more

OSGi for business applications

OSGi is a dynamic module system for Java.  An OSGi system is a network of components that communicate via defined interfaces.  Each component is deployable, manageable, and updatable, with predictable effects on the other deployed components.  Each component can be...

read more