vendredi 30 décembre 2011

Défi Google Cloud [Nuit de l'Info 2011]

Défi Google Cloud [Nuit de l'Info 2011]

Description du défi

Le but de ce défi est SOIT de réaliser une application App Engine qui mobilise un maximum de puissance de calcul, SOIT de réaliser la meilleure application qui utilise la Prediction API de Google.

Si vous choisissez la prediction API, l'application sera jugée sur sa qualité générale et la pertinence de ses choix techniques.

Si vous choisissez la version “puissance de calcul” du défi, cette puissance sera mesurée en FLOPS sur une durée de votre choix. Il faudra bien entendu être capable de mesurer cette puissance avec une bonne fiabilité, et en convaincre le jury. Le calcul effectué doit également être pertinent d'un point de vue scientifique ou technique et également être adapté au thème général de la nuit (Exemples non pertinents: additionner les chiffres de 1 à N, faire N fois le même calcul, …). Sans rien révéler du thème, je vous conseille de commencer à regarder les algorithmes de datamining. Cette version du défi met l'accent sur la puissance de calcul et il sera acceptable de fournir une application qui ne résout qu'une partie (la partie calculatoire) d'une application plus générale correspondant au thème de la nuit.

La qualité de l'interface utilisateur sera un plus, notamment si elle met en valeur la puissance utilisée de façon originale.

dimanche 25 décembre 2011

And the Winners of the Cyber Challenge Are...

Government Computer News (12/19/11) William Jackson

The SANS Institute and the Common Knowledge Scholarship Foundation recently announced the winners of the most recent U.S. Cyber Challenge, a competition to identify future cybersecurity professionals.  Competitors came from more than 150 U.S. high schools, and the top finishers received more than $6,000 in scholarships.  More significant than the performance of the winners is the fact that more than 2,000 students from 169 schools in 32 states and three territories participated, says (ICS)2 Foundation director Julie Peeler.  "That's a good number of kids who are being exposed to cybersecurity, regardless of whether they go into the profession," Peeler says. "We are at least educating a larger workforce overall to an understanding of cybersecurity issues."  The Cyber Foundation competitions are part of a broader U.S. Cyber Challenge effort that includes summer camps for college, high school, and younger students, the Air Force Association's Cyber Patriot program, and several other scholarship and training programs aimed at developing a future professional cybersecurity workforce.  Launched in 2009, the U.S. Cyber Challenge set a goal of identifying and recruiting 10,000 people with native skills needed for cybersecurity.

Traditional Social Networks Fueled Twitter's Spread

MIT News (12/21/11) Caroline McCall

Massachusetts Institute of Technology (MIT) researchers studied the growth of Twitter from 2006 to 2009 and found that its initial growth in the United States relied heavily on media attention and traditional social networks based on geographic proximity and socioeconomic similarity.  The researchers examined data from 16,000 U.S. cities, focusing on the 408 with the highest number of Twitter users.  They characterized cities as early adopters, early majority adopters, late majority adopters, or laggards based on when 13.5 percent of the population had Twitter accounts.  "The social network needs geographical proximity," says MIT professor Marta Gonzalez.  "In the U.S., anyway, space and similarity matter."  The researchers found that Twitter's initially popularity was fueled by young, tech-savvy users in San Francisco and Boston.  However, after that it began to follow a more traditional pattern by traveling short distances, which implied that personal interactions were important to its wider use.  "Nobody has ever really looked at the diffusion among innovators of a no-risk, free, or low-cost product that's only useful if other people join you," says MIT graduate student Jameson Toole.  "It's a new paradigm in economics: what to do with all these new things that are free and easy to share."

dimanche 18 décembre 2011

openvpn - Documentation Ubuntu Francophone

Pascal Fares added you to his circles and invited you to join Google+

Pascal Fares added you to his circles and invited you to join Google+.
Join Google+
Google+ makes sharing on the web more like sharing in real life.
An easy way to share some things with college buddies, others with your parents, and almost nothing with your boss. Just like in real life.
Conversations are better face-to-face. Join a video hangout from your computer or mobile phone to catch up, watch YouTube videos together, or swap stories with up to 9 of your friends at once.
Lightning-fast group chat. Photos that upload themselves. A bird's-eye view of what's happening nearby. We built Google+ with mobile in mind.
You received this message because Pascal Fares invited to join Google+. Unsubscribe from these emails.

SSH_VPN - Community Ubuntu Documentation

This page discusses using SSH to set up SSH-based point to point connections, which can then be used to create routes that create virtual private networks.


Did Apple's iPhone Redefine Photography?The Next Web

vendredi 16 décembre 2011

France : iOS capterait plus de 82% des visites d'applications

vis d'expert - Malgré un nombre de terminaux en circulation plus important, Android ne concentrerait que 16% des visites d'applications selon une étude de AT Internet.
lire la suite:

- partagé via le bouton Google Share

jeudi 15 décembre 2011

Fwd: High Quality Apps - Faster with Reduced Risk and Cost, and more!

---------- Message transféré ----------
De : "SourceForge Resource Newsletter" <>
Date : 15 déc. 2011 14:39
Objet : High Quality Apps - Faster with Reduced Risk and Cost, and more!
À : <>

                                               Resource Newsletter 


In This Issue: 

Five Myths of Cloud Computing
Featured Resource:
Cost/Benefit Case for Enterprise Warehouse Solutions
Data warehousing has emerged as one of the IT world's fastest growth areas. Demand for high-quality, current information and for tools to interpret and exploit it shows no signs of abating. The report provides an in-depth comparison of three platforms designed for this purpose: IBM Smart Analytics System 7700, Oracle Exadata Database Machine and Teradata's flagship Active Enterprise Data Warehouse (Active EDW) 6650.  Results are based on input from 46 users of these systems and their recent predecessors, on other industry sources, as well as on research and analysis conducted by the International Technology Group.

Visit the Webcast library!  Webinars, Videos, Digital Events and More!
Whitepapers & Technical Briefings    
Five Myths of Cloud Computing
Cloud computing continues to grow in popularity among the IT industry. And more businesses are advertising that they are the front runner for providing the best cloud services. However, in this race to remain top dog, IT pros remain unsure of what cloud computing is and the benefits it can bring to their organization.
High Quality Apps -  Faster with Reduced Risk and Cost
Successful organizations are taking advantage of these new capabilities to produce smarter software applications and to carve out new niches in the marketplace. Software is the invisible thread of innovation that helps make ongoing innovation and growth happen. However, most organizations continue to struggle with leveraging their software investments for strategic differentiation.

Evolution of Legacy Network Infrastructure
The promise of the next-generation network is great - the seamless delivery of media-rich content, virtualization, mobility, and cloud computing. Migrating legacy infrastructures to achieve the high-performance you organization requires, takes time and strategic planning.  Understand the evolution of the enterprise network infrastructure to a high-performance next-generation network, from data center to edge. Topics covered include IPV4, IPV6, flexible network architecture, cloud computing, multi-vendor network management, mobility, unified communications, network convergence, and more. 
Defining the Next-Generation Server
Running a data center in today's enterprise computing environment is no easy task. Data center managers need to consolidate - saving power, floor space and other facility overheads, as well as use resources efficiently. They have to be able to manage and process vast datasets ("big data") and solve compute-intensive problems without losing the ability to run more routine computing needs. They need to be able to connect, as required, with new cost-effective cloud computing services.

Technology Fueling the Next Phase of Storage Optimization
IT organizations are plagued by issues of data growth, more stringent requirements for recovery time objectives (RTO's) and recovery point objectives (RPO's), and reduction in operational staff to manage it all.  Disk-assisted data protection aids in accelerating backup and recovery performance -- and data deduplication makes the economics of implementing disk-to-disk backup more feasible.  Today's most popular backup storage features deduplication, but doesn't address the long-term operational issues that arise as secondary storage environments expand.  

10 Tips for Better Server Consolidation
Every organization today is looking for ways to build faster services and accelerate the delivery of mission-critical applications while reducing costs. Improving server infrastructure is crucial to accomplishing these goals. Server consolidation achieved through virtualization is essential to this strategy. But how can you better utilize virtualization? 10 must-read tips that can help any IT manager better leverage virtualization technologies and more easily consolidate servers and improve the efficiency of their infrastructure.
5 Ways Your Anti-Malware Solution is Draining your Budget
As IT environments become more complex and the malware threat more burdensome, enterprise IT staffs are being forced to re-evaluate their anti-malware solutions. The solutions that worked yesterday are ineffective against today's threats that exploit mobile platforms, open source operating systems and the Web. Anti-malware is no longer a commodity and businesses find their current solution is costing them in ways they never before imagined.

You are subscribed to this Resource Newsletter as 
To unsubscribe from all of our mailings, click here or send an email to: with the address: in the subject line.
To ensure delivery of this newsletter to your inbox and to enable images, please add to your e-mail address book or safe senders list.

SourceForge  |  594 Howard Street,  Suite 300  |  San Francisco, CA  94105

To view our Privacy Policy click


dimanche 11 décembre 2011

Open source web conferencing | The Open Source Advocate

Link: (via

Have you ever wanted to attend a webinar but quickly discovered that the web-conference service doesn't even support your operating system? This has happened to me several times and it irks me greatly! I always make sure to tell the company that they should switch their web-conferencing service to one that supports multiple platforms including Linux.

It is somewhat hypocritical when an open source company offers a webinar about their open source product, but they don't allow customers with open source operating systems like Linux to attend. I ran into this ridiculous issue when trying to attend a Zimbra webinar. I told them that it was wrong for them to have such great multi-platform support in their product and at the same time only allow Windows users to participate in their webinars. We'll see if they take that advice to heart.

A conference GNU/Linux Server

Link: (via

Dear reader, you may be involved in organising conferences or just simple meeting. You know that it is sometime difficult for some participants to attend such meetings, travel costs, hotel bookings, important deadlines to meet, while they could be listening to the proceeding from work and interact from time to time with the speakers. I wanted to leverage my knowledge of Linux to provide an all in one solution on one machine to provide, Internet access to participants and allow everybody with an Internet connection to participate in the meeting.

This HOWTO is published on The Linux Documentation Project this is where you will find the latest version of this document.

Comparison of web conferencing software - Wikipedia, the free encyclopedia

Video Conferencing, Web Conferencing & Webinar Solutions |

GoToMeeting : Online Meetings Made Easy (R)

Link: web_ meeting/ROWPPC/g2msem3/sf/701000000005L0s;jsessionid=abc5kPl8lMnXjhTO1DTqt? (via

Un ami vous a envoyé un lien depuis :

J'ai trouvé cette page qui pourrait t'intéresser. TEST réseaux sociaux tikiwiki version8.2

vendredi 9 décembre 2011

In Race for Fastest Supercomputer, China Outpaces U.S.

Newsweek (11/28/11) Dan Lyons

China is outpacing the United States in terms of supercomputer development.  In November the Chinese debuted the Tianhe-1A, a supercomputer with five times the processing power of the biggest computer at the U.S.'s Lawrence Livermore National Laboratory.  The country that develops a superior high-performance computing system gains massive economic and military advantages, and the U.S.'s loss to a competing nation in the field of supercomputing could jeopardize its edge in many scientific, security, and military areas.  To close the gap, Livermore scientists are developing Sequoia, a supercomputer that will combine 1.6 million microprocessors and trump the Tianhe-1A's computing power by a factor of eight.  Although the United States has 263 of the world's 500 largest supercomputers, China has built 74 in just 10 years.  Adding to U.S. developers' pain are Chinese organizations devising supercomputer components that will allow China to end its reliance on U.S. vendors for parts.  Livermore scientists also project the emergence of an exascale machine that taps the computing muscle of about 1 billion microprocessors and delivers six times the power of Sequoia within a decade.  Crucial to this milestone will be a new kind of microprocessor that is far more energy-efficient than today's chips.

dimanche 27 novembre 2011

''Waterfall, Moonbow, and Aurora from Iceland'' image via #NASA_APP

Motorola Xoom

One more language! > Google to Unveil 'Dart' Programming Language

eWeek (09/09/11) Darryl K. Taft

Google plans to introduce a new programming language called Dart at the upcoming Goto conference. Dart is described as a structured Web programming language, and Google engineers Lars Bak and Gilad Bracha are scheduled to present it at Goto, which takes place Oct. 10-12 in Aarhus, Denmark. Bracha is the creator of the Newspeak programming language, co-author of the Java Language Specification, and a researcher in the area of object-oriented programming languages. Bak has designed and implemented object-oriented virtual machines, and has worked on Beta, Self, Strongtalk, Sun's HotSpot, OOVM Smalltalk, and Google's V8 engine for the Chrome browser. In 2009, Google introduced the experimental language Go in an attempt to combine the development speed of working in a dynamic language, such as Python, with the performance and safety of a compiled language such as C or C++.

Java is NO1 and Objective-C, C#, D Language: Winners in Programming Popularity

InfoWorld (09/12/11) Paul Krill

Java has been the top language for 10 years. but new language are comming, specially D...

Objective-C rose to sixth place on the Tiobe Programming Community index of most popular programming languages in September. Used for developing Apple iOS applications, Objective-C ranked eighth a year ago. C# has risen two spots from last year to become the fourth most popular programming language. Meanwhile, D, which is considered a potential successor to C++, returned to the top 20 for the first time since the middle of 2009, coming in at 20th place. Although the F# language, a functional language for Microsoft's .Net platform, has fallen out of the Top 20 after making its first-ever entrance at 20th place in August, it is expected to make a quick return because it represents a new generation of functional languages. Java remains first on the list, followed by C, C++, C#, and PHP, which has fallen from the fourth place spot. Objective-C, Visual Basic, Python, Perl, and JavaScript round out the top 10. Ruby, Delphi/Object Pascal, Lua, Lisp, Transact-SQL, Pascal, PL-SQL, Ada, RPG (OS/400), and D complete the top 20 ranking this month.

vendredi 25 novembre 2011

Hottest Major on Campus? Computer Science

Network World (11/21/11) Carolyn Duffy Marsan

Elite technology schools are receiving increasing numbers of applications from students wanting to pursue a computer science degree.  Admissions officers and computer science professors expect to set a record for undergraduate applications this year, surpassing marks set more than a decade ago.  "Most of the U.S. economy is stagnant, but computer science grads are getting hired and at pretty good salaries," says Carnegie Mellon University's Mark Stehlik.  Enrollment in U.S. undergraduate computer science programs has been rising for the last three years, according to the most recent Taulbee Survey, which is conducted by the Computing Research Association.  "Our computer science program has had such an incredible amount of publicity lately," says Harvey Mudd University's Thyra Briggs.  "Also, the increased presence of women in that department is affecting our applications."  Stanford University has seen its computer science majors increase by 83 percent in the last three years.  "Our enrollment was up 30 percent this fall over last fall, and we expect to see continued growth on an annual basis," says Stanford professor Mehran Sahami.  In addition, 90 percent of Stanford's nearly 7,000 undergraduates are currently taking at least one computer science course even though it is not required to graduate.


Search algorithme...

Google's Search Algorithm Challenged
IDG News Service (11/19/11) Philip Willan

Padua University professor Massimo Marchiori is leading the development of Volunia, a new search engine that could challenge Google's search algorithm and lead to radically different search engines in the future. "It's not just Google plus 10 percent. It's a different perspective," says Marchiori, who contributed to the development of Google's search algorithm. "It's a new radical view of what a search engine of the future could be." Volunia's Web site allows visitors to sign up for a chance to test the beta version of the search engine, which will be launched in 12 languages by the end of the year. "If I didn't think it was something big, capable of competing with the giants of online search, I would never have got involved," Marchiori says. The project is headquartered in Padua, with funding being supplied by Sardinian entrepreneur Mariano Pireddu. "The difference of our search engine is what will enable us to emerge," Marchiori says. Pireddu says the Volunia researchers are not attempting to build a better search engine than Google's, but rather they are trying to create a different kind of search engine that can work alongside Google's.
View Full Article | Return to Headlines

Percona Live: MySQL Conference And Expo 2012 | Percona Live: MySQL Conference And Expo 2012

Motorola Xoom

samedi 24 septembre 2011

Searching for New Ideas

Technology Review (09/22/11) Tom Simonite

In an interview, Google director of research Alfred Spector, who is leading a team that is focused on the most challenging areas of computer science with the goal of shaping the company's future technology, discusses its work in artificial intelligence (AI). Spector says the group is working on areas such as natural language processing, machine learning, speech recognition, translation, and image recognition. The research has resulted in better translation tools that now use parsing, and Fusion Tables, which enable users to create a database that is shared with others and to visualize and publish the data. Spector says that Google's general approach to AI is actually a hybrid AI, which means that the company learns from its user community. He says that AI also could contribute to social network communications technology by recommending content or communicating across languages. Beyond AI, the researchers are working on security issues, specifically if it is possible to constrain the most-used programs to run with minimal amounts of information.
View Full Article

Gambas - Gambas Almost Means Basic

Vous êtes habitué a Visual Basic vous souhaitez passer a Linux? Il y a Gambas - Gambas Almost Means

A Subversion client

  • About TortoiseSVN

    TortoiseSVN is an easy-to-use SCM / source control software for Microsoft Windows and possibly the best standalone Apache Subversion® client there is. It is implemented as a Windows shell extension, which makes it integrate seamlessly into the Windows explorer. Since it's not an integration for a specific IDE you can use it with whatever development tools you like.

    The current version is 1.6.16

    For detailed info on what's new, read the changelog and the release notes.
    The current version 1.6.16 is linked against the Subversion library 1.6.17.
    Please make sure that you choose the right installer for your PC, otherwise the setup will fail.

    TortoiseSVN 1.6.16 - 32-bit, linked to SVN 1.6.17 TortoiseSVN 1.6.16 - 64-bit, linked to SVN 1.6.17

'IPad Deconstructed' Forum Makes Case for Federal Research

Computerworld (09/22/11) Patrick Thibodeau

Federally supported research sparks game-changing innovation, according to a U.S. Capitol forum on the future of federal research moderated by Carnegie Mellon University professor Luis von Ahn. He says in an interview that the forum used the iPad as an example, as most of its components came from federally supported research. Von Ahn argues against a Senate proposal to cut the budget of science research funding, saying that a reduction could hurt the sustainability of U.S. technological leadership. He notes that private tech companies cannot do research on their own, as they have a priority to deliver commercial products in the short term. However, federal research projects take a long-term view and are borne out of the pursuit of basic questions. "If you look at lot of the game-changers [new technologies] over the last few years, it's not because someone was trying to solve a specific problem, it was just because somebody was trying to understand something better," von Ahn says.
View Full Article

vendredi 6 mai 2011

Open Source Lebanese Mouvement (OSLM)

Open Source Lebanese Mouvement (OSLM): what is the open source business model?

Open Source Lebanese Mouvement (OSLM): what is the open source business model?: "It is often confusing to people to learn that an open source company may give its products away for free or for a minimal cost. How do ope..."

Configure mod_proxy_ajp with Tomcat, an example.

mod_proxy_ajp is an Apache module which can be used to forward a client HTTP request to an internal Tomcat application server using the AJP protocol.
To respond to the question "Why should I use mod_proxy_ajp rather than a classic mod_proxy ?"
  • You can gain a lot of flexibility (lot of the apache modules/features can be used especially "name-based virtual hosting")
  • Practical for those who need to support Java applications along with PHP / Perl … (only one apache server is needed)
  • Certificates management is easier in apache configuration (this argument is a lot subjective)
  • It's not Tomcat's main objective to serve http static resources (not optimized for that)
  • Load balancing/cluster management is easier with an apache frontend

Tomcat configuration

You just have to create the AJP connector in the conf/server.xml file like that:
 port="8009" enableLookups="false" redirectPort="8443" protocol="AJP/1.3" />
This line will enable AJP connections to the 8009 port of your tomcat server (localhost for example).By default you have to do nothing, the ajp connextor is already configured in default server.xml after installation.

Apache2 configuration

One way (useful if this apache is a global front end) is to create a virtual host for this application.
Listen 80
NameVirtualHost *:80
   ErrorLog /var/log/apache2/ajp.error.log
   CustomLog /var/log/apache2/ajp.log combined
   <Proxy *>
     AddDefaultCharset Off
     Order deny,allow
     Allow from all
   ProxyPass / ajp://localhost:8009/
   ProxyPassReverse / ajp://localhost:8009/
  • ProxyPass and ProxyPassReverse are classic reverse proxy directives used to forward the stream to another location.
  • ajp://... is the AJP connector location (your tomcat's server host/port)

What's the result ?

A web client will connect through HTTP to (supposing your apache2 server is running and you configured your DNS to serve this apache instance), the mod_proxy_ajp will forward you request transparently using the AJP protocol to the tomcat application server on localhost:8009.

jeudi 21 avril 2011

proxy ajp , tomcat via apache

=VirtualHost *:80=
ServerName Notebook
ErrorLog /var/log/apache2/ajp.error.log
CustomLog /var/log/apache2/ajp.log combined
=Proxy *=
AddDefaultCharset Off
Order deny,allow
Allow from all
ProxyPass / ajp://localhost:8009/
ProxyPassReverse / ajp://localhost:8009/

Nouveauté Java 7

Les Nouveautés de Dolphin


Comme toutes les anciennes versions, le JDK 1.7 vient avec son lot de changements et de nouveautés. Ces changements sont issus de propositions de développeurs. On remarque certaines nouveautés tirées du langage C#. Les principales nouveautés sont :

Des String dans les switch

La structure conditionnelle switch n'acceptent, actuellement , que les types byte, char, short, int et les enum. Dans Java 7 on pourra aussi utiliser des String.

Gestion automatique des ressources

Les ressources externes au programme tels que les fichiers et les flux d'entrée/sortie n'étaient pas gérés par le Garbage Collector, ainsi les programmeurs devaient utiliser la méthode close() pour les fermer manuellement.
La nouvelle syntaxe propose de déclarer les ressources entre deux parenthèses entre le try et l'accolade ({), et la fermeture sera gérée automatiquement. Ce qui réduit la taille des blocs finally et rend le code source moins verbeux et donc plus lisible.

Diamond syntax

Cette syntaxe a pour but de simplifier la déclaration de vos types paramétrés (Generics) en évitant la duplication de code comme le montre cet exemple:
Code : Java - Sélectionner
List<Map<Integer,List<Boolean>>> liste=new ArrayList<Map<Integer,List<Boolean>>>();
//pourra être remplacé par :
List<Map<Integer,List<Boolean>>> liste=new ArrayList<>();

Le compilateur pourra ensuite déduire le type à partir du contexte.

Closures/expressions lambda

Une expression lambda est une fonction anonyme qui peut contenir des expressions et des instructions.
Les Closures sont déjà présentes dans plusieurs langages (C#, Lisp, etc.). Avec Dolphin il est maintenant possible de déclarer une Closure et de l'invoquer avec la méthode "invoke()".
Actuellement, en java c'est possible de s'en sortir sans les closures, en utilisant la réflexivité ou les interfaces et classes internes mais ça reste lourd à mettre en place et trop verbeux. Cette nouveauté touche beaucoup le domaine du Calcul mathématique et de l'intelligence Artificielle.
Exemple d'utilisation:
Secret (cliquez pour afficher)
Code : Java - Sélectionner
// déclaration de l'expression lambda
#int(int) carre = #(int x)(x * x);
// appel de l'expression
int valeur=carre.invoke(6);


Le multi-catch permet de traiter identiquement plusieurs types d'exceptions, afin d'éviter la duplication du code. Il suffit de séparer les différentes classes d'exceptions par le symbole | .
On pourra aussi relancer une exception depuis un bloc catch en utilisant throw e;

java.util.Objects : la fin des NullPointerException

La classe java.util.Objects contient des méthodes statiques(static),simples et efficaces qui opèrent sur les Object d'une manière null-safe.
Dans ce package on trouve, par exemple, la méthode equals(Object a, Object b), elle renvoie true si les 2 Object passés en paramètres sont null et a.equals(b) si a est non null. Cette méthode vous garantira donc une comparaison sans soucis de recevoir un NullPointerException, et vous débarrasse des conditions du genre if(a==null) .
Toutes les autres méthodes de ce package ont le même but : lutter contre les NullPointerException !!

Image utilisateur

NIO.2 : nouvelle API pour gérer vos fichiers

La classe File du package n'est pas très efficace puisqu'elle ne comporte pas des méthodes pour déplacer/copier les fichiers, et dont les méthodes ne génèrent pas d'exceptions claires, ce qui rend les erreurs quasi-impossibles à retrouver. Donc une nouvelle classe java.nio.file.Path sera ajoutée à l'API standard pour remplacer File. Elle comportera des méthodes pour la copie/création/comparaison des fichiers et des dossiers.

Swing : encore plus beau

Image utilisateur

Swing aussi subira quelques changements dont l'ajout d'une classe JLayer qui facilitera la personnalisation des composants Swing, l'ajout d'un calendrier et la possibilité de personnaliser les composants avec du CSS .
On peut noter aussi la possibilité de gérer la transparence des composants.

Sun ajoutera aussi le look-and-feel Nimbus dans le package javax.swing.* afin de donner un aspect plus moderne à vos GUI. La particularité de Nimbus vient du fait qu'il soit facilement personnalisable.Cependant Metal sera toujours le look-and-feel par défaut pour des problèmes de rétro-compatibilité.
Si vous avez installé le jdk 6 update 10, vous pouvez utiliser Nimbus en ajoutant ce bout de code à vos programmes:
Secret (cliquez pour afficher)
Code : Java - Sélectionner
for (LookAndFeelInfo info : UIManager.getInstalledLookAndFeels()) {
        if ("Nimbus".equals(info.getName())) {

Image utilisateur

Image utilisateur

Les superpackages : plus de modularité

Actuellement, pour qu'une classe soit utilisable dans deux packages différents(ou plus) elle doit être déclarée public. Le problème est qu'elle devient visible partout, même pour le client. Avec Java 7, il suffira de mettre les différents packages qui utilisent la classe dans un superpackage (un fichier et la classe sera visible uniquement pour toutes les autres classes et interfaces du superpackage.

JAM : Le remplaçant du JAR

le JAM (Jar 2.0) est une amélioration du format JAR. En fait un fichier JAM est un JAR auquel on ajoute quelques informations tel que le nom,les imports,les classes publiques, la version... Ceci dans le but de fournir plus d'infos pour les utilisateurs d'une bibliothèque ou autre.

Image utilisateur

Garbage-First : Le nouveau Garbage Collector

Le G1 GC est un nouveau GC qui sera introduit dans la VM de sun du JDK 7. G1 utilise le parallélisme qui existe dans le matériel d'aujourd'hui. Il utilise tous les processeurs disponibles afin de réduire le temps des pauses (pauses nettoyage) imposés aux threads de l'application Java. Contrairement à l'ancien GC, G1 effectue le compactage du tas au fil du temps.Ce compactage élimine les problèmes de fragmentation potentielles pour assurer un bon fonctionnement pendant de longues périodes. Une version expérimentale de G1 est disponible avec le JDK1.6 update 14.

Support natif des langages à typage dynamique

La JVM permet depuis quelques années le support des langages autres que Java sur la JVM (JSR223). Ce sont généralement des langages de très haut niveau utilisant un typage dynamique (le type d'une variable n'est pas défini à sa déclaration, comme en Ruby, Python ou PHP par exemple). Pour le moment, la JVM ne supporte pas nativement le typage dynamique, on est donc obligé d'utiliser de l'introspection pour découvrir le type retourné par une méthode. Ça fonctionne, mais c'est lent ; la nouvelle JVM qui arrive avec Java 7 ajoute donc une instruction au bytecode Java qui permet d'effectuer cela sans utiliser l'introspection, de façon beaucoup plus performante (JSR292).


Le système d'exploitation open source MeeGo intéresse de plus en plus de sociétés depuis que Nokia lui a tourné le dos au profit de Windows Phone 7.
C'est en tout ce qu'a révélé Valtteri Halla, membre du groupe de pilotage technique de MeeGo et ex. employé de Nokia lors d'une conférence organisée vendredi.

Le système issu de la fusion de deux plateformes fondées sur Linux de Nokia et Intel (Moblin et Maemo) séduit notamment le conglomérat industriel LG Electronics qui rejoint un groupe de travail de l'OS, en compagnie d'autres entreprises comme ZTE et China Mobile.

Ce groupe de travail est destiné à mieux adapter l'OS aux smartphones. MeeGo étant jugé pour l'instant plus adapté aux tablettes avec plusieurs modèles déjà à son actif (lire ci-devant) et pas encore le moindre smartphone.

Un porte-parole de LG confirme de son côté cette nouvelle et affirme l'engagement de son entreprise sur plusieurs groupes de travail de l'OS.
Toutefois, il tempère en affirmant que pour l'instant « LG n'a pas de plan définitif pour produire en masse des périphériques sous MeeGo, autres que les systèmes de divertissement automobiles ».

À savoir s'il restera encore de la place pour un autre OS mobile dans un marché hautement concurrentiel.

Réponse... quand MeeGo sera enfin prêt pour les smartphones.

Source : Reuters

mercredi 30 mars 2011

Equipements et services télécom : et si la compatibilité IPv6 était obligatoire ?

La raréfaction des adresses IPv4 se poursuit inexorablement : le 24 novembre la barre des 100 jours de stock encore disponible était franchie, et aujourd'hui, deux semaines plus tard, il ne reste qu'à peine plus de 100 millions d'adresses IPv4 attribuables, qui seront épuisées dans environ 83 jours, c'est à dire moins d'un trimestre :

On se rappelle que, lorsque l'État a décidé de basculer la télévision hertzienne de l'analogique au numérique, avec le déploiement de la TNT, il a mis en place des mesures contraignantes : les fournisseurs d'équipements, en l'occurrence les fabricants de télévision, ont eu l’obligation d’intégrer un tuner TNT à l’ensemble de leurs produits.

Ainsi, dans l’article 19 de la loi sur la « modernisation de la diffusion audiovisuelle et la télévision du futur », promulguée en mars 2007 et en vigueur un an plus tard, il était stipulé que « Dans un délai de douze mois à compter de la promulgation de la présente loi, les téléviseurs vendus aux consommateurs sur le territoire national intègrent un adaptateur permettant la réception des services de la télévision numérique terrestre ».

Evidemment, il existe aujourd'hui des solutions comme le NAT pour continuer à utiliser des adresses IPv4 en dépit de la pénurie qui arrive. Pour autant, certains se disent que l’on pourrait passer à la vitesse supérieure : ainsi pourrait-on envisager qu’une loi contraignante impose aux équipementiers télécom et aux fournisseurs de services IP de ne plus avoir le droit, passé une certaine date, de fournir des équipements qui ne seraient pas nativement compatibles avec IPv6

lire encore

mardi 29 mars 2011

Héberger vos applications dans le nuage Google "App Engine"

Getting Started: Java

This tutorial describes how to develop and deploy a simple Java project with Google App Engine. The example project, a guest book, demonstrates how to use the Java runtime environment, and how to use several App Engine services, including the datastore and Google Accounts.
This tutorial has the following sections:

mardi 22 mars 2011

Adding Multiple Databases to replication... This is How...

MASTER: add lines to my.cnf
output> file | Position | Binlog_Do_DB
mysql-bin.000963 1570 database_name_1,database_name_2,database_name_3

lire l'article complet

Google Web Toolkit Overview - Google Web Toolkit - Google Code

Google Web Toolkit Overview - Google Web Toolkit - Google Code: "– Envoyé à l'aide de la barre d'outils Google"

lundi 21 mars 2011

Replication Mysql Master / Master

Dans cet article nous allons essayer de mettre en place une solution qui assure la redondance d'une base de donnéesMySQL et qui permet de partager la charge entre deux nœuds.
Pour assurer la redondance des données nous allons avoir recours à la réplication native de MySQL.
En ce qui concerne le partage de charge, nous allons utiliser MySQL Proxy bien qu'il soit encore à sa version 0.8 Alpha.

Redondance des données:

Dans cette section, nous allons configurer une réplication entre deux Maîtres MySQL, identifiés par DB-1 et DB-2, sachant que dans cette configuration, chaque Maitre sera en même temps l'esclave de l'autre.
Ce schéma est plus expressif:

Le grand avantage de cette architecture est d'avoir deux bases de données sur lesquelles on peut écrire en parallèle sans se soucier de la synchronisation, la réplication se charge de synchroniser vers DB-2 ce qu'on écrit sur DB-1, et vice versa.
C'est d'ailleurs pourquoi on va utiliser MySQL Proxy qui se placera comme partageur de charge entre ces deux bases de données.

lire l'article complet (clicker ici)