Posts

Showing posts from 2012

Consuming Web API using JavaScript and XMLHttpRequest method

Image
Using JavaScript with remote services by calling REST, JSON, WCF or other web service will decrease data round trips and will allow to create reach web interfaces. For demo I will use Visual Studio 2012 and MVC4. Client call will be hosted in MVC4 page and service will be provided by WebAPI which is also based on MVC4. Lets first see how it works in one server environment, more complex scenario will be in next posts.  Start Visual Studio 2012 and create a web site using ASP.NET MVC4 Web Application template.

Then choose Basic template without creating test project.
Create HomeController and corresponding View which will response to root address

I want to skip details about creating controllers and views, you can find a lot of samples and blog posts about it. On next step I will create another controller which will response to JavaScript calls. To create WebAPI page right click on Controllers folder and click on Add / Web API Controller class. In new window just edit ValuesController1 by remov…

File Strider

Just was playing with WPF and as a result created small tool which scans disk and shows top 50 folders and files consuming space.

So visit http://www.filestrider.com
Tool is open source and under Microsoft Public License, get from http://filestrider.codeplex.com

Web Services - SOAP, REST, JSON ...

IntroductionWeb service is a software component which is stored and run on remote server and accessible via network. Web services are consumed by desktop and web application by calling remote methods using different communication protocols like HTTP and SOAP. Data transferred should be formatted depending on protocol, so it can be binary or XML format. (Deitel 1218-9) Unfortunately while speaking about web services many techs mean SOAP while it was the most popular protocol, but there is now big family which represents web services. Big familyWeb service can be consumed by any application which has implemented required protocol, definitely if application is authorized. The main benefit is OS and development language independent, while the main goal of the web service is to provide interoperability and integration. There are some protocols which has limitation like Web Communication Framework of Microsoft which when it requires .NET applications when using socket communication. But that …

Biometric authentication methods

Introduction There are three methods for authentication. Most widely used is “what you know”, which requires to provide secret information like login and password, pin code or passphrase. The second method is “something you have”, which will require a magnetic card, card with RFID chip, flash card or smart card. The third method is “what you are”, these methods will require providing something which is unique for you and cannot be passed to someone else, it can be fingerprints, voice, retina or face geometry scans. “What you are” method is also called biometric method and based on biometrical characteristics which distinguish one person from another (Cavoukian, 1997). PresentLet call “what you know” and “what you have” methods “traditional”. Traditional methods are about not to identify a subject as a such, and tools used for authentication are easy to forget and loos. The oldest and still used biometric authentication method is handwriting signatures, which is very weak authentication…

Security overdone?

IntroductionWhile planning and developing web sites we always should keep in mind that someone always will be paranoid with it. So being paranoid with security will keep us away from security issues we can meet after production. As more popular will be our web site, then more paranoid should be security. With internet technologies explosion and content enhancing, migrating to dynamic pages, payment systems integration web sites became more vulnerable [1]. Who is who?A threat is a potential problem and bad thing which can occur with your system and data.
Vulnerability is a weak area where threat can occur. It can be after bad design, weak data encryption or sensitive information storing on client side without encryption [4]. Vulnerable areasSo where we can potentially have a breach? Well-designed application will be built on layers like database, business, communication, user interface. So each layer as communication between layers is a potential security problem. Authentication impleme…

HTML 5 thoughts

How it wasWorld Wide Web technology is young enough in comparison with the Internet.  Hyper Text Markup Language (HTML) was proposed by Tim Berners- Lee, scientist from CERN, in 1989. The version was not so flexible and contained only 18 elements – tags. It was used to build web pages, the primary information container in World Wide Web [1]. Bereners-Lee is the director of World Wide Web Consortium, Web standards organization founded in 1994. The organization develops standards, tools and software which support Web [2]. HTML became very popular with Netscape browser bust in 1990’s when it was the primary browser and was the synonym of web browsing. Having Netscape that days was meaning having access to the Internet. The warSome companies released own browsers with HTML support and in 1990’s there were only few players in that area. At the beginning two primary browsers where available Netscape browser and Internet Explorer by Microsoft Corporation. Internet Explorer became a part of op…

Artificial Intelligence, thoughts ....

Artificial Intelligence is a part of engineering science which is about computer intelligence. Especially it intelligent computer programs which engage the behaviors that human considers intelligent.

Since old times people tried to create intelligent mechanism which could understand and be smart enough to response and help. At this moment AI is becoming the reality. Engineers can create machines and software which will respond to our actions like moves, speech recognition and even mimics. Apple Computers works on software which will automatically recognize your face and unlock device like your mobile, tablet or PC [1]. Microsoft created exciting feature Kinect which recognizes player’s 3D body motion and can track body movement and communicate with game player[3]. In 1997 Deep Blue [5] computer system was able to beat world chess champion Garry Kasparov [4], Kasparov said that Deep Blue demonstrated deep intelligence and creativity during the game.

The central problem of Artificial…

Indexing and Hashing

|If data is indexed it means that there is a one another file or source which stores information where each record or records with the same criteria are stored. Without index whole data scan will be required and if there are thousands of records it will take time to get a record which is required. If the request has some parameters which will need to compare some fields of stored records it will drastically increase search time. Creating new indexes will increase index file size and during time it can become very large so index retrieval process can slow records reading time, also any data modification will trigger changes in index file. Also during time index information can be fragmented so there will be need in index rebuild or reorganization depending on fragmentation percentage.
In a hashed file, data is distributed and divided into blokes, which are called buckets, and buckets are the data container for records. Buckets are created with special algorithm. A record can be easily f…