Thursday, March 26, 2009

TIOBE Software: Tiobe Index

TIOBE Software: Tiobe Index:
TIOBE Programming Community Index for March 2009
March Headline: All time high for JavaScript, all time low for Perl

The TIOBE Programming Community index gives an indication of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. The popular search engines Google, MSN, Yahoo!, and YouTube are used to calculate the ratings. Observe that the TIOBE index is not about the best programming language or the language in which most lines of code have been written."

Thursday, March 19, 2009

Learning Binary...

Learning Binary...: "
Introduction

We’ve all seen binary code. We’ve come to think of them as a bunch of ones and zeroes in long strings… 010010101010101001101011

But these ones and zeroes can also represent decimal numbers. First off, I will show you how to read these numbers as the decimal numbers we’re used to in our daily life. Then, I will show you how to use those numbers and your keypad to translate them into text. Note that your computer doesn’t use the decimal system, so technically, when it converts binary to text, it doesn’t go through the process I will show you. This is just a divertive way of explaining you how the binary system works.

The Binary System

Basics

Let’s think of the example above as empty slots:


First off, you read binary from right-to-left. It’s just the way it’s designed. The first slot from the right represents a value of one, the second from the right a value of two, the third from the right a value of four, the fourth from the right a value of eight, the fifth from the right a value of sixteen, and the cycle continues by multiples of 2. This will never change.


By putting a 1 or a 0 in those slots you are either saying you want to corresponding value that’s attached to that slot or you don’t. A 1 means yes, and a 0 means no. For example, putting a zero in the first slot from the right, but a 1 in the second slot from the right means you want a two, but not a one:

-------------------------------------------------

1 0

-------------------------------------------------

As such, the number above equals to a decimal value of two.


As an example, let’s say you want to represent eight in binary form. Well, thinking about the slots, you want the first slot to be 0 because you don’t want a one, you want the second slot to also be 0 because you don’t want a two, you want the third slot to also to be 0 because you don’t want a four, but you want the fifth slot to be 1 because you want a value of eight. As such, eight in binary form is:

-------------------------------------------------

1 0 0 0 (or simply 1000 without those underlines)

-------------------------------------------------

Now it is important to note that the amount of zeroes that precede the first value of one from the left is unimportant. So for example:

-------------------------------------------------

1 0 0 0 is the same as 0 0 0 1 0 0 0 (1000 = 000100)

-------------------------------------------------

To get it cleared up, here’s another example:

-------------------------------------------------

0 1 is the same as 1

-------------------------------------------------


Exercises

Question: What do the following equal in decimal terms?

a) 100

b) 000100

c) 100000

d) 0010

Answers:

a) 4

b) 4

c) 32

d) 2


More Binary!

If you got the answers above right, then you pretty much understand the basics of binary. Let’s now understand how to get the corresponding decimal values to the numbers which are not multiples of 2.


To get the total value of a binary number, add the values corresponding to each slot. So, for example, three in binary would be:

----------------------------------------------------

11

----------------------------------------------------

The above corresponds to three because if you add the total values of all the slots, that is to say a one from the slot to the right, and a two from the second slot to the right, then it equals three.


As another example, let’s say you want to represent 5 in binary terms. Then you would need a value of one to be added to a value of four, and you would not want a value of two:

---------------------------------------------------

101 [Reading from the right: 1(one) + 0(two) + 1(four) = five]

---------------------------------------------------

Here’s an additional example:

---------------------------------------------------

001011 [Reading from the right: 1(one) + 1(two) + 0(four)
+ 1(eight) + 0(sixteen) + 0(thirty-two) = eleven)

---------------------------------------------------

Exercises

Question: What do the following equal in decimal terms?

a) 11011

b) 110

c) 010101

d) 10110

Answers:

a) 27

b) 6

c) 21

d) 22


If you got the above questions correct [without cheating], then you essentially understand the binary system. Understanding the binary system was the hard part. What follows is pretty easy.


Converting Binary to ASCII (Text)

Basics

ASCII is essentially the letters, numbers and symbols that are stored in our computers through the use of fonts. When the keyboard relays the buttons you pressed, it sends in a code which is then converted to the ASCII equivalent of “k” or “5” or whatever key you pressed.

Here’s an example of a message “hidden” in binary text:

---------------------------------------------------------

0100100001100101011011000110110001101111

---------------------------------------------------------

Now there are only so many letters, numbers and symbols stored for ASCII. Having sets of 8 digits for their binary equivalent is more than enough to represent all of these letters and the like. As such, all strings that represent text like in the above are separated into bits of 8 for simplicity:


----------------------------------------------------------

01001000 01100101 01101100 01101100 01101111

----------------------------------------------------------

Okay, so our example message was separated into 8 digit strings. The decimal value for each of these strings in the example was calculated for you.


----------------------------------------------------------

01001000 = 72
01100101 = 101
01101100 = 108
01101100 = 108
01101111 = 111

----------------------------------------------------------

The result was 72,101,108,108,111. Now, there is something called the ASCII table. It essentially corresponds to the binary numbers from yore to the equivalent letters/symbols/numbers. But since we found the decimal values of these binary strings, we can use a major shortcut.


By pressing ALT + [The Number], you will get the ASCII equivalent of that number. For example, by pressing the ALT key and at then (while keeping it down) the numbers 72 in any text editor, you will get the corresponding “H” to show up.


Let’s do so for the entire example message:

-----------------------------------------------------

72 = H
101 = e
108 = l
108 = l
111 = o

-----------------------------------------------------

So the entire “hidden” message translates to “Hello”.

Excercise

Question: Decode the following message

01000011011011110110111001100111011100100110000101 11010001110
10101101100011000010111010001101001011011110110111 00111001100100001


Hint: The first step on your way to decoding the message (separated into bytes for you)

---------------------------------------------------------

01000011 01101111 01101110 01100111 01110010
01100001 01110100 01110101 01101100 01100001
01110100 01101001 01101111 01101110 01110011
00100001

---------------------------------------------------------"

Thursday, March 12, 2009

Virtualization & Cloud Computing Providers and Contributors

Virtualization & Cloud Computing Providers and Contributors : "Virtualization Technology Providers and Contributors in 2008-2009
The following companies are among the providers and contributors of Virtualization technology: 3PAR, Accellion, Acronis, Actional, Active Endpoints, ActiveGrid, activePDF, ActiveServers, ActiveState, Actuate, Adaptec, Agile Software, AGiLiENCE, Agilysys, Akorri, AlachiSoft, Alter Logic, Altor Networks, Altova, AMD, AMDAHL, Amentra, Amyuni, anacubis, Apani, APC, Appcelerator, AppSense, AppStream, Array Networks, Ascential, Astaro, Attune Systems, Autodesk, AutoVirt, Availl, Avanade, Azul Systems, Barracuda Networks, BEA Systems, B-hive, Black Duck Software, Blackbaud, Blade Network Technologies, Blue Coat, Blue Lane, BlueArc, BlueNote Networks, BluePheonix Solutions, BMC Software, Borland, Bristol Technology, Brix Networks, BroadVision, Brocade, Burton Group, Business Objects, CA, CalAmp, Cassatt, Cast Iron Systems, Catbird, Cayenne Technologies, Ceedo Technologies, Cenzic, Certeon, CiRBA, Cisco Systems, Cision, Citrix Systems, ClearApp, ClearCube Technology, CollabNet, Compass America, Composite Software, Compugen, Compuware, Configuresoft, Continuity Software, Coraid, Courion, Coyote Point Systems, Crescendo Networks, CSC, DataCore, DataSynapse, Dell, Desktone, Digipede Technologies, Double-Take Software, Ecora Software, EDS, eG Innovations, Egenera, Elastra Corporation, Electric Cloud, Embotics, EMC Corporation, Emulex, Endeavors Technology, Enigmatic Corporation, Enterprise Management Associates, Entuity, EqualLogic, Ericom Software, ESRI, EVault, eXludus Technologies, F5 Networks, FalconStor, FastScale Technology, Foedus, Force10 Networks, Fortisphere, Forum Systems, Fujitsu, GemStone Systems, Getronics, GlassHouse, Green Hills Software, Grid Dynamics, GridGain Systems, GT Software, Hitachi, HP, Hyper9, Hyperic, IBM, ICEsoft, IGEL Technology, Illumita, ILOG, IMEX Research, Information Builders, Ingres, InstallFree, Integrien, Intel, Intellium, International Computerware, iTKO LISA, JBoss, Juniper, KACE, Kidaro, LeftHand Networks, Leostream, Lifeboat Distribution, Liquid Computing Corporation, Liquid Technology, Lynux Works, Mainline, ManageIQ, Managed Methods, ManageSoft, Marathon Technologies, McAfee, Mellanox Technologies, Microsoft, Mid-Atlantic Computers, Mindbridge Software, Mindreef, MKS, MonoSphere, Motorola, MQSoftware, mySoftIT, NASTEL, Ncomputing, NEC, Neocleus, NeoPath Networks, Neoware, NetApp, Netegrity, Neterion, Netuitive, Neverfail, Nexaweb, NextAxiom, Nimbus, Nimsoft, Niyuta, NoMachine, Novell, ONStor, Opalis Software, Open Kernel Labs, OpenSpan, OPNET Technologies, Optaros, OpTier, Oracle, Pano Logic, Parallels, Parasoft, Perforce Software, PHD Technologies, Phoenix Technologies, Phurnace Software, Pillar Data Systems, PlateSpin/Novell, Progress Software, Prolifics, ProSync Technology, Provision Networks, QLogic, Quest Software, Racemi, Raritan, Raxco Software, Red Hat, Reflex Security, Resolution Enterprises, RingCube Technologies, Riverbed Technology, Rogue Wave Software, RSA Security, Sagnet Solutions, SanDisk Corporation, SAP, SAVVIS, ScaleMP, Scalent Systems, Seanodes, Secure Command, Secure Computing, Sentillion, Shavlik Technologies, ServInt Internet Services, Silpion IT Solutions, SIMtone, Skytap, Skyway Software, Software AG, Sonasoft, SourceGear, Splunk, StackSafe, SteelEye Technology, StillSecure, StoneFly, Stonesoft, Stoneware, StoreVault, StrikeIron, STT WebOS, Sun Microsystems, SunGard, Supermicro Computer, Surgient, SWsoft, Sybase, Symantec, Systar, TBD Networks, Tenfold, TheInfoPro, Thinstall, Third Brigade, TIBCO Software, Tidal Software, Tideway Systems, TOA Solutions, TRANGO Virtual Processors, Trend Micro, Tresys Technology, Trigence, Tripwire, Ulteo, Unisys, United Devices, VaST Systems, VDIworks, VeeAm Software, Verari Systems, Verio, VeriSign, Vicom Computer Services, VirtenSys, Virtera, Virtual Iron, VirtualLogix, Virtugo Software, Virtutech, VisionCore, Vizioncore, VKernel, VMLogix, vmSight, VMware, Vordel, vThere-Sentillion, Vyatta, WaveMaker, Web Age Solutions, WSO2, Wyse Technology, XDS, XenoCode, Xiotech, xkoto, Xsigo Systems, Zenith Optemedia, Zeus Technology.

Cloud Computing Technology Providers and Contributors in 2008-2009
The following companies are among the providers and contributors of Cloud Computing technology: 10Gen, 3Leaf, 3Tera, Absolute Performance, Accenture, Akamai, Amazon.com, Appirio, Appistry, Areti Internet, Boomi, Box.net, Canaan Partners, Cloud9 Analytics, CloudWorks, CNI Systems, CohesiveFT, CSRware, DataDirect, Dell, DNAmail, eBay, Elastra, EMC, EngineYard, Enki Consulting, Enomaly, Excelian, Flexiscale, Fortress ITX, Forum, GigaSpaces, GoGrid, Google, HP, IBM, IBRIX, Joyent, JumpBox, Layered Technologies, Level 3 Communications, Linxter, LongJump, MDV, Microsoft, Moka5 (MokaFive), Mosso, NewServers, Nirvanix, Ocarina Networks, OpSource, Panorama Software, Peer1 Networks, Pervasive Software, Platform Computing, PLX Technology, Qlayer, Rackspace, RampRate, Red Hat, RightScale, rPath, Salesforce.com, Saugatuck Technology, ServePath, Skills Matter, Skytap, SnapLogic, SOASTA, Sun Microsystems, Symphoniq, Symphony Services, Tap In Systems, Teneros, Terremark, Transitive Corporation, Univa UD, Verizon Business, Vertica, VMware, XCalibre, Zabovo.com, ZOHO and Zuora."

Friday, March 6, 2009

Jumper: JasperReport Export to Excel Snippet code


Jumper: JasperReport Export to Excel Snippet code
:
"Sample code that will export JasperReport(.jasper) to excel, pay attention to the bold code
that's all the tricks. The sample servlet will accept two parameter the date and the name of the report.


/*
* JasperToExcel.java
*/

import bean.report.RowStatistics;
import java.io.*;
import java.util.ArrayList;
import java.util.Calendar;
import java.util.Collection;
import java.util.HashMap;
import java.util.Iterator;
import javax.servlet.*;
import javax.servlet.http.*;
import net.sf.jasperreports.engine.JRDataSource;
import net.sf.jasperreports.engine.JRException;
import net.sf.jasperreports.engine.JasperPrint;
import net.sf.jasperreports.engine.JasperRunManager;
import net.sf.jasperreports.engine.data.JRMapCollectionDataSource;
import net.sf.jasperreports.engine.export.JExcelApiExporter;
import net.sf.jasperreports.engine.export.JRXlsExporterParameter;

/**
*
* @author amontejo
* @version
*/
public class JasperToExcel extends HttpServlet {

public static final String REPORT_DIRECTORY = '/reports';

protected void processRequest(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
HttpSession session = request.getSession();
String reportName = request.getParameter('reportname');
String selectedyear = request.getParameter('SelectedYear');
InputStream reportStream = getServletConfig().getServletContext().getResourceAsStream('/' + REPORT_DIRECTORY + '/' + reportName + '.jasper');

ServletContext context = this.getServletConfig().getServletContext();
JasperPrint jasperPrint = null;
HashMap parameterMap = new HashMap();

parameterMap.put('parayear', new String(selectedyear));

try {
ServletOutputStream servletOutputStream = response.getOutputStream();
JRDataSource dataSource = createReportDataSource(request, selectedyear, reportName);
jasperPrint = JasperFillManager.fillReport(reportStream, new HashMap(), dataSource);
generateXLSOutput(reportName, jasperPrint, response);
} catch (Exception e) {
}
}

private String tagreport(String string) {
java.util.Calendar calendar = java.util.Calendar.getInstance();
return string + calendar.get(calendar.MONTH) + calendar.get(calendar.DAY_OF_MONTH) + calendar.get(calendar.YEAR);
}

private void generateXLSOutput(String reportname,
JasperPrint jasperPrint,
HttpServletResponse resp)
throws IOException, JRException {
String reportfilename = tagreport(reportname) + '.xls';
JExcelApiExporter exporterXLS = new JExcelApiExporter();

exporterXLS.setParameter(JRXlsExporterParameter.JASPER_PRINT, jasperPrint);
exporterXLS.setParameter(JRXlsExporterParameter.IS_DETECT_CELL_TYPE, Boolean.TRUE);
exporterXLS.setParameter(JRXlsExporterParameter.IS_WHITE_PAGE_BACKGROUND, Boolean.FALSE);
exporterXLS.setParameter(JRXlsExporterParameter.IS_REMOVE_EMPTY_SPACE_BETWEEN_ROWS, Boolean.TRUE);
exporterXLS.setParameter(JRXlsExporterParameter.OUTPUT_STREAM, resp.getOutputStream());
resp.setHeader('Content-Disposition', 'inline;filename=' + reportfilename);
resp.setContentType('application/vnd.ms-excel');

exporterXLS.exportReport();
}


//
/** Handles the HTTP GET method.
* @param request servlet request
* @param response servlet response
*/
protected void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}

/** Handles the HTTP POST method.
* @param request servlet request
* @param response servlet response
*/
protected void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
processRequest(request, response);
}

/** Returns a short description of the servlet.
*/
public String getServletInfo() {
return 'Short description';
}
//
}"