"; */ ?>

software


8
May 07

Tab Preview Extension for Firefox

"Tab Preview" is a new extension for Firefox 1.5 (and later) that shows a tab content (page) preview as you move your mouse pointer to a tab:

Tab Preview Extension for Firefox

This comes very handy when you have lots of different tabs, especially on the same topic and similar titles.

This extension is quite configurable through "Tools -> Add-Ons -> (extension) Options":

Tab Preview Extension Options

Try it out, it is very fast and adjusts the size of its previews automatically depending on a browser window size.

I found it to be a very cool one – install it to experience its beauty :)

 


7
May 07

Windows New Live Hotmail – Still Far From The Old Gmail

Microsoft has released a new version of its Hotmail with 2Gb of space, AJAX looking, blah, blah, blah. Here is how it looks by the way

Windows Live Hotmail

1.    First thing that I tried once I logged my self in is to use simple letters as shortcuts, well the same way we use shortcuts in Gmail, remember? "c" to compose a new mail, "n" for the next message, "p" for the previous message, and so on. Well Hotmail stays Hotmail no matter what – explicit shortcuts are NOT there

2.    Second thing is I tried to resize my inbox with mail, you know, if they make it so lame by default, I thought maybe I can do that. Guess what… well you guessed right – can’t explicitly do that too

3.    Then I clicked on that annoying huge "Windows Live" bar on top – got a completely empty screen with "http://www.getlive.com/" in my address bar. Hm.. annoying and empty – why?

4.    Clicked on "full message view" in a preview panel – gave me a good message view, but I spent at least 5-6 seconds figuring out how to go back to normal view (I had to close the whole window) – explicit? Human Computer Interaction problem? How hard is it to put "back to normal view" or something like that?

5.    Looked for labels, found them by logging to my Gmail, so.. no labels – is it patent by Google, or Hotmail is too cool for that?

 

Overall, it is much better than old Hotmail, but way far from being "Gmail compliant". Lots of colorful bars, ads, response time (I have a high speed connection), HCI (human computer interaction) principles used (and not used), etc.

I give it "C+". Well, yea – I am the user, means Hotmail is my student, and apparently Freshmen. So get to books Hotmail, and remember SIMPLICITY is the key – Keep It Simple Stupid (KISS), or is it not from Windows Bible? :)


7
May 07

The Seven Stages of Expertise in Software Engineering

software engineeringMy friend Deep, who is a J2EE architect, sent me this article to "use it as a benchmark every time I am asked to rate my skills as a software engineer". I found it very cool and right away it helped me to see people on the project I am currently on in a very efficient and "simply simple" (KISS) perspective. I will definitely revisit these stages in the future to see what stage I am on, or between which stages I am at.

Here they are – The Meilir’s Seven Stages of Expertise in Software Engineering:

Below is a part of the article written by Meilir Page-Jones for Wayland Systems Inc.
I spoke with Meilir, and with his permission I am posting his wisdom here

Stage 1: Innocent

A Stage 1 may not have heard of Software-Engineering techniques. Or — more likely nowadays — he may be vaguely aware of their existence but may not see their possible relevance to his situation. Indeed, he may be only dimly aware that there are any software-development problems in his shop. You may find it incredible that Stage 1s could exist in the 1990s, but they do. And the reason stems from the way in which software complexity evolved.

Software became insidiously more and more complex in the 1970s and 1980s as users demanded more and more sophisticated systems be installed on the more and more powerful hardware that became available. Yet there was no sharp transition. The earth was not hit by a Complexity Asteroid in 1975 that suddenly made software three orders of magnitude more complex and cast our reptilian development techniques into extinction.

I call the way in which software complexity actually increased “Frog in the Pan.” This is because although a frog will jump out of a pan of hot water, a frog that is placed in a pan of cold water and slowly heated will fail to leap forth and will actually boil to death. The temperature gradient is so gradual that there will never be a point at which the frog declares: “Boy, it’s suddenly gotten hot in here! I think I should hop out.” (Before I get into deeper trouble from animal-rights folks, I hasten to add that this analogy is apocryphal. I’ve never tried the experiment and I don’t recommend that you do so either !)

Many Stage 1s are experiencing “Frog in the Pan” and are trying to tackle problems of the 1990s with approaches of the 1960s and 1970s, without realizing that the problems they’re facing are the very ones that modern Software-Engineering techniques were created to alleviate.

Stage 2: Exposed

Stage 2s have noticed that the water is getting decidedly warm, if not downright hot. So they are actively seeking Software-Engineering techniques that will get them out of the pan or at least reduce the heat. Stage 2s may survey magazines, confer with colleagues or attend one-day overviews of the techniques. Their interest level is high but their knowledge level is low, being limited to a few terms and definitions and not based on any practical Software-Engineering experience.

Stage 3: Apprentice

Stage 3s have attended one or two 5-day workshops on Software-Engineering techniques. In these workshops they tackled small but realistic case studies that resembled their own projects in miniature. The case studies provided valuable kinesthetic reinforcement of the formal lecture material and were thus indispensable. However, the case studies’ apparent realism conveyed to the Stage 3 a confidence that is often unwarranted.

If a Stage 3 absorbs everything from a seminar, then he is minimally equipped to tackle a true, full-sized project in the corporate jungle. Usually, however, a Stage 3 does not grasp everything or has difficulty scaling the techniques up from a case study to a real project. You could say that most Stage 3s know just enough to be dangerous!

Stage 4: Practitioner

The rite of passage to Stage 4 is the use of Software-Engineering techniques on at least one significant project. Achieving “Stage 4-hood” is for many people the most difficult transition of the six transitions between stages. The fledgling Stage 4 is asked to take untried (by him) techniques and apply them to a corporate project with the usual demonic cocktail of politics, deadlines and changing requirements. At the same time, he is attempting to recall what he learned in class and scale up the examples 10- or 100-fold. He continually needs consulting advice, without which he will encounter a series of minor setbacks or major failures. Since many people throw up their hands at this point and revert to their old mediocre but familiar ways, a large proportion of Stage 3s never make it to Stage 4. If an entire project is peopled with Stage 3s, then it’s highly likely that the project itself will fail and the Software-Engineering techniques will be publicly pilloried and then abandoned. 

Stage 5: Journeyman

Stage 5s have made it. Their experience of Software-Engineering is “latched” in place and there is little risk of their reverting to the past. In the Stage 5 the Software-Engineering techniques yield for the first time the productivity the marketing folks promised; and on each successive project a Stage 5 further hones his skill and enhances his productivity. A Stage 5 is self-sufficient – more often the source of Software-Engineering advice than its recipient.

Stage 6: Master

The Stage 6 not only is an adept technician, but also possesses a profound methodological foundation. Beyond the “whats” and “hows”, the Stage 6 knows the “whys” of Software Engineering. This depth allows him sometimes to break a surface rule, while adhering to a more fundamental methodological principle. The Stage 6 is a good instructor because his theoretical and practical knowledge give him the wherewithal to tackle difficult student questions.

Stage 7: Researcher

The Stage 7 is concerned with delivering the latest developments in Software Engineering to a wider audience, via books, articles and conference appearances. The Stage 7 looks out for flaws in contemporary Software-Engineering techniques and for consequent ways to improve the techniques. He also scans the horizon for new problems towards whose solution Software Engineering can be extended and generalized. The Stage 7 is at a methodological pinnacle.

These Seven Stages of Expertise are valuable in their own right. You might think about a Software-Engineering technique that you know and consider which of the stages you are in with respect to that technique. You may also decide what (if anything) you should do to progress to the next stage.

However, there are organizational implications behind the Seven Stages. Below I discuss four of these: The Productivity Curve, Pilot Projects, The Critical Consulting Core and Ephemeral Technology.

 

Below is a "Stage-based Productivity Graph" that was compiled by Meilir based on his clients’ statistics:

Stage-based Productivity Graph

Software Engineering Stages Productivity Graph

7
May 07

jakarta.apache.org commons configuration

Apache released version 1.4 of the Jakarta Commons configuration library!

A very useful library that unifies the way all the configuration parameters are handled and lead to much more clear layout in especially big projects with a lot of packages, components and frameworks.

Commons Configuration provides a generic configuration interface which enables an application to read configuration data from a variety of sources. Commons Configuration provides typed access to single, and multi-valued configuration parameters as demonstrated by the following code:

    Double double = config.getDouble("number");
    Integer integer = config.getInteger("number");


Configuration parameters may be loaded from the following sources:

  • Properties files
  • XML documents
  • Property list files (.plist)
  • JNDI
  • JDBC Datasource
  • System properties
  • Applet parameters
  • Servlet parameters

Different configuration sources can be mixed using a ConfigurationFactory and a CompositeConfiguration. Additional sources of configuration parameters can be created by using custom configuration objects. This customization can be achieved by extending Abstract Configuration or AbstractFileConfiguration.

The full Javadoc API documentation is available here.


1
May 07

Wifi WEP is Hacked in “less than 60 seconds”

wifi WEP hacker

In less than two minutes hackers can defeat the security measures protecting many home wireless internet connections.

Defeating these measures could let them capture passwords, steal confidential information or download illegal pornographic material using the connection.

Many home internet users rely on an encryption system called Wireless Equivalent Protection (WEP) to stop others using their wi-fi link, even though WEP has long been known to be flawed.

In early April three cryptographic researchers at the Darmstadt Technical University in Germany revealed a method of exploiting the flaws far more effectively.

Before now it took at least 20 minutes of monitoring the airwaves before it was possible to break in to a wireless network protected by WEP.

Now, armed with a program iwritten by the researchers, it is possible to break in to the same network far faster.

"Breaking in to a WEP protected network is now very easy to do," said Erik Tews, one of the researchers.

"Doing it in 60 seconds is realistic, or five minutes in the very worst case. We think now that WEP is really dead and we recommend that no-one should use it."

In its place he recommends an encryption system called Wi-fi Protected Access (WPA), introduced four years ago to replace WEP. "We have had a very close look at WPA and we can’t find anything to exploit," he said.

The only known way to defeat WPA encryption – and WPA2, a newer version – is to use what is known as a brute force dictionary attack.

This involves trying millions of different words or combinations of words from in the hope of stumbling upon the correct password.

 

by Paul Rubens right from the source