Tuesday, September 23, 2008

Dell Studio Hybrid Personal outlook


This is by no means an official Review of any type, I just wanted to post my personal outlook on the dell studio hybrid

The Hybrid is small, although not smaller than I though, it weight roughly around 10 pounds and it has a very nice design. It was power light and light in the middle of the machine that lights ups words that state hybrid. The intel graphic card is not half bad. I installed the machine with a 60' LG plasma screen and it supports half the resolution of the screen which its(INCOMPLETED POST)

Sunday, September 14, 2008








Jose
Hernandez


09.13.08
Professor: Jose Osorio



Layered
Application Architectures:



Why Breaking things into Layers (a background on the logic of
layering):


In
the last decade the complexity of application have increase this has
lead general programming practice of creating applications in a
layered structure a must; mainly due to a multitude of benefits with
minimal downsides. Layer structure an application are built to
“support such operational requirements as maintainability,
reusability, scalability, robustness, and security”. How do
they accomplish this. Well first off my offering interchangeable
programming code or parts. By doing this it allows programing to be
more reusable. With the move towards interchangeable code also comes
the design aspect of localizing changes in the code to affect only
the programing module or part it belongs to. This adds a layer of
security due to separated function in the design of an application,
you can set which programmer works on what section of the application
and which module produces changes to another. In an overall summary
the move to layered structure signifies more specializations across
the board of tasks, code, and work procedure.


Programming Layered Application Chart







Data Layer:


First
off the data layer is highlighted green in the chart and its primary
and sole purpose is the interaction with data inside databases and
exporting this information to the business layer. The reason for the
creation of the data layer was to separate the business layer from
the details of the data storage solution, to have an interchangeable
data storage component. This in turns “minimizes the impact of
changing database providers”, “minimizes the impact of
change data representation”. The user does not interact
directly with the data, DBMS(data base management system) does this.
The user interacts with the DBMS to request data and the way they
wanted represented. The ADO.net (ActiveX Data Objects) components
relate to data storage and retrieval in Visual Studios. Examples of
the data layer, is the ability to interchange DBMS in a design, for
example you can sue Microsoft SQL for a DBMS or you can use Suns
MySQL, or Oracle.


Business
Layer:


The
business layered in the layer architectural design of business
application is the layer that translated the need and wants for the
business into business processes/work flow which then get converted
into business software rules and components. Business components are
the essence of the business layer. Business components can be made my
simply configuring a BizTalk Server and defining the business
processes. A example of the business tier is the credit allocated
that certain customers have, this is a business rule that must be
implemented in the application as a macro module that handles
available credit for customers. The business layer in the char above
is represented by the blue boxes.



Presentation Layer:



The presentation layer is mainly responsible for representing the
user with the data, given then a user interface to manipulate the
application. In the .NET world this consist of creating various
forms, these forms will be use to navigate to the appropriate data,
represent the data to the user and prove the user with the necessary
controls for manipulation of information. The user interface(UI)
components and the interface process components(UIP) are the building
blocks of the presentation layer, they provide the application
developer with the necessary tools to communicate with the business
layer. The UI components provides the System.Windows.Forms objects to
create feature rich user applications.



The yellow highlighted boxes above represent the presentation layer.
An example of the presentation layer is any form in an application.



A practical approach to Layered Application development chart:








Computing Environments:


Monolithic:


Monolithic
Kernels, in my own words an omni kernel, this is a operating
environment that everything is store in the system memory space, let
that be drivers, servers, networking stack. The difference between
this and a micro kernel is that a micro kernel will only contain in
the kernel the necessary for basic operations, for example Virtual
Memory allocation, scheduler, but it will not contain such things as
device drivers. Device drivers are included in monolithic kernels. AN
example of a mnonolithic kernel is FreeBSD and Linux.


C
lient/Server:


This
computing environment does not require a heavy explanation, it is
simple, you have a server a central hub/provider, which servers
information to its clients, clients can be users, computers,
protocols, applications. A very simple example is the web is a client
server model. The web browser is a client, and a web server is the
server. A web server serves web pages and the browser displays them.
The downside to this environment is that the information is
centralized therefore, if the server goes down no client will ever
reach their destination or information requested.


Peer-to-Peer(P2P):


Also
Known as Class Action Sue model. This computing model makes use of
nodes, nodes act as both clients and server, nodes in turn share
information to other nodes. P2P does not centralize the information,
the information is therefore spreading through out the Peer-to-Peer
network. A recently example of peer to peer network is bit torrent,
Limewire, former Napster, etc.. The downside of this design is that
the environment depend entirely on the performance, and participation
of the peers


Distributed
Environment:



Distributed Environment consist multiple computer/nodes that are all
working or running the same process they communicate with each other
through the network to accomplish each task. This type of environment
makes use of multiple node resources, a example of this is the wua.la
project, they make use of your hard drive space, so you in turn can
store files online. This is very useful when you need to make large
computations and don't have the necessary resources at hand. The
downside of this environment is if the grid(network) is not
implemented correctly the environment poorly.



N-Tier Computing:


Is
an environment in which the application is executed by multiple sub
agents, for example, an application that utilizes middle-ware. The
most common form of N-tier computing, is the Three-Layer model
discussed above. The three layer model is in essence a client-server
model, an example of this is a web server with a database attached to
it. A famous one is gmail, gmail is a web email server that uses the
web interface as the presentation layer, it uses the google server
cluster in which is cluster is responsible for an activity. A cluster
maybe responsible for storing your mail, another for processing
(sending and receiving). The cluster responsible for storing will be
labeled the data layer and will have a sub agent called the DBMS, the
cluster responsible for managing your mail will be label the
presentation layer cluster.







The Gang Of Four:


Design
Patterns: Elements of Reusable Object-Oriented Software was a book
written in 1994, the book was written to show solutions to common
programming issue during this time. The gang of four
Erich
Gamma, Richard Helm, Ralph Johnson, and John Vlissides the book
authors presented a way of documenting programs and design patters to
object oriented programs. The Gang produced 24 design patters in the
books, these were broken down into 3 category, the category are:
Behavioral, Creational, Structural Patterns.


Design
aptterns avaiable for .NET are for example in C++, structural ,and
real world. “Structural code uses type names as defined in the
pattern definition and UML diagrams. Real-world code provides
real-world programming situations where you may use these patterns”.






Work Cited



Design
Titles in C# and .NET
Data & Object Factory(2001). .
Retrieved 23:60, September 14, 2008, from
http://www.dofactory.com/patterns/patterns.aspx







Image
of Three Tier Model (2008, January).. Retrived, September 13, 2008,
from


http://en.wikipedia.org/wiki/multitier_architecture





.NET
Application Architecture The Data Access Layer (2006,
July)..Retrieved, September 14,2008 from
http://www.simple-talk.com/dotnet/.net-framework/.net-application-architecture-the-data-access-layer/





Three
Layered Service Applications Microsoft MSD (2008)..Retrieved,
September 14, 2008 from
http://msdn.microsoft.com/en-us/library/ms978689.aspx





Practical
Chart Image..Retrieved, September 14, 2008 from
http://www.webopedia.com/img/app.arch.gif


















Page
1




Thursday, September 4, 2008

NOTES FOR CLASSES THIS SEMESTER

I though it would be neat to post the notes of the classes I'm taking this semester, the class

Computer Programming In Windows : MOST OF IT IS VISUAL STUDIO

Website Construction and Management: MOST OF IT IS JSP's AND SERVLETS

Information Storage and Retrieval: MOST OF IT IS Database Concepts and SQL querys

I will be posting some notes depending on the Day, the windows IT class looks promising.

Tuesday, September 2, 2008

WHATS NEW UPDATE!!

THe company is doing better than ever, concentration on Inventory management systems was a very good idea. Looking desperately for sales guys, good ones are hard to come by.

lets see what can I add new, I got linux + certified - this means I need to update my resume
I'm currently working on my CCNA
Finished MIS degree, learned that with MIS there is only 2 ways to go, 1 get a dual bachelors in a Business course or do FIUs Masters

Been working on construction sites also deployed mobile VPN networks, here are the pics:



Any interested in Getting a CCNA soon please shoot me an Email asap

Friday, August 1, 2008

Monday, July 21, 2008

New Website for the opeNINetwork Family

its called Ajeit
this is a domain seller website,, great deals on new domain names and hosting packages.

Wednesday, July 16, 2008

Neat Site to see useful apps

http://www.alienpicks.com/

It is slightly outdated but, it does include some nice user comments and description of great software

Best Free Keylogger

BFK, wow a free keylogger, it still installs as a virus but wow is it good. It has all the option of a conventional keylogger, you can download it and try it out at:
http://sourceforge.net/project/showfiles.php?group_id=113998
I will cover more in-depth key loggers in my next post

Thursday, June 19, 2008

New Browsers



Well Firefox 3 over all seems faster, they have included an auto complete on the address bar, which I think is pretty sweet. The GUI was changed slightly but nothing too dramatic.



What really astonished me was the new Opera browser 9.5, wow, that is all I can say wow. This thing has everything and a litttle bit more. Anything you would expect and need from a browser it has. First it has all he features that firefox has, plus cooler widgets. And finally someone gets the clue about bookmark synchronization, wow, the service is amazing and it is called opera link, check it out here:

http://www.opera.com/products/link/

Wednesday, June 11, 2008

New Cool Thing to Do online

check this out it seems like this is the new "cool" thing to do online. I will do a miserable attempt to move the blog there. It is call video blogging and is basically having a life feed off your blog. My favorite podcast (Linux Action Show) just moved to this method, and I'm considering it.
Check out the site:
http://www.ustream.tv/

Wednesday, June 4, 2008

HACK THAT BOX EVENT IN FIU

Florida International University is hosting a event called HACK that BOX. I wonder what it is about?? Well I hope they continue putting out technical fun events like these that involve some creative thinking. The event takes places on ECS Room 280 and starts at 3:00 PM

I will be taking my new eeepc which I finally loaded with the new BT3 (BackTrack 3) to do some 'hacking' myself and take a whack at that box.

There I believe will be some prizes involved for whom ever is able to hack it.

Sunday, June 1, 2008

Dominican Republic Tranning

I did a training the past week by Scientific Atlanta/Cisco. The training covered how to setup a Head End and use System Manager. System Manager is a server that manages analog cable systems, this managers everything down the line, it is the only machine you will ever need to manager over 500,000 analog cable boxes. This is a dead technology in the USA and Industrialized countries, but in 2nd world countries like Venezuela, Columbia, Dominican Republic, etc... Attached are the Pics of the system, the collocation/ Head End where we where working on and the system.




Tuesday, May 27, 2008

Last Weeks Meeting For the Rainbow Project

we have a site for the project now:

RainBow Center

To find get to our island search for FIU Ryder Business Island

Here are the Pictures of Our Last Meeting:



And of the Board Design So Far:


Sunday, May 18, 2008

To clarify last post

A video from Verisign on two factor Authentication:

YubiCo and its YubiKey


It is a member of the one time password initiative, this people are a defiantly a check out for future one time password solutions.
How does the YubiKey works and what does it do for me.

The Yubi key is basically a usb key(token)that you insert into your computer and when you hit the green glowing light on the usb key, it spits out a 44 character string that is your password. The 44 letter string is semi sudo random data. Which means it can be tgracked back to your key but it cannot be track or duplicated or reverse engineered. This is in essence a perfect unique password. This string is different every time you hit the green glowing button, so there is no worries of some key logging your password. Also portion of the string is 128 bit AES randomly generated number.

Now for uses, how can this be used. Well think car keys, think credit card authorization keys, think computer passwords, anytime of authentication method that requires a key and or password of any type can be replaced by one of this single keys. The only mystery requirement is that the receiving party of the string must have your key ID (part of the 6 first characters of the string) programed into it.
____________
For more information check out: http://www.yubico.com/products/yubikey

Shibui Resturant


This is my favorite sushi place here in Miami. The sushi is amazingly cheap and great tasting, fresh every time I visit, the name is Shibui.

Here is the pic of the last supper with the family

Sunday, May 11, 2008

Shift Happens

Please see this video it always puts me into perspective, it is amazing it is how fast we are progressing as a human race and it is diving our progressing my cultures.

Thursday, May 8, 2008

Secondlife Monopoly Design


Here you may see me working on a second life project with professor Ronald M Lee. We are trying to recreate the game of monopoly in second life. Does anyone have an Idea on how to deal with title cards with out using the inventory system and assigning note cards to the title cards??? We are puzzled as you can see. To the back you can also see the monopoly board design.

Wednesday, April 30, 2008

Second life cuba Dance Video

This is one was created by our team, not the best quality due to the restriction we had in size. The whole clip is 10 mb in size

Friday, April 25, 2008

Amit and Elance Virtual Community Paper

This is not one of my best but surely I will develop this paper over time as a case study: ELANCE AND AMIT

FIU System design presentation On Second Life-Cuba

Finally I can start studying on my Linux + Test

Well I'm currently in the stage of L(liberation), of the 4-hour work week book I'm now out of my office and paid on a contract basis. Not too shabby huh. Now I can and will concentrate on two things, my start up company Lego Network, and my linux test, I was to finish it by the end of next month to start on my ccna and then go on to the Mac OS X: ACSP.
I had a presentation on Wednesday's last week it was awesome we did great: Pics

Friday, April 18, 2008

Two New sites Up soon

Getting Ready to deploy 2 new sites, one to sell online training videos, all the tools discussed in this Blog will be there and the second is to sell myself ;-). I'm also opening a computer consulting business down in Miami for those who need rack and telco centers done.

Thursday, April 17, 2008

Vmware Fusion for Macs

I know that if you live in the technical world, you must have heard about Virtualization if not ,please google it now, it will save your career, I don't care who you are, in the tech community. I wanted to make a special note to Fusion and also Vmware server for linux, if not the best my favorite virtual machine created. Dump microsoft's attempt at virtualization with virtual pc, it sucks, lags and its not very flexible. If you have a Mac, first off (donate money to the poor you rich bastard) and second get Fusion, it will make you mac life much better, run linux and windows seamlessly in it.

Monday, April 14, 2008

Saturday, April 12, 2008

VIDEO STREAMING SERVER

You must check out this nifty little tool it does video streaming. Obviously is free and for linux (opensource). It is called VLC video client, it is very famous in the linux circles but if your a windows lover, this is an easy install and it works amazingly as a streaming server for media. If you don't know what a streaming server is, well is basically a server thatyou input either live video or video through, a dvd/RCA/etc. and it get converted to an internet feed (similar to a internet radiostation) where you can view that previously stated video

Wednesday, March 26, 2008

Took Vacation

Have not posted anything due to the fact that a took a vacation in a Royal Caribbean Cruise Line. Will Upload pictures of Bahamas and CocoCay.

Thursday, March 13, 2008

Attacking and Defending

I will be working on a paper soon for two programs, I will have to develop a wiki for a program that defends the user and a program that attacks the user/system. I will be covering truecrypt and metasploit. I promise a very interesting article on metasploit due to the fact that is the only opensource Pen testing framework I have been able to find in my webscapde's.

Friday, March 7, 2008

Shields Up, and GRC.com

Ohh boy do I have a recommendation, first off I want to talk about grc.com and Steve Gibson the owner. Mr. Gibson is an amazing programmer who has the time to program neat little tools and host them for free in his site, the one I'm recommending today is ShieldsUp!, it is a web base port scanner that basically tell you where your firewall and your network has a exploitable hole. Aside from this amazing free tool Mr. Gibson is the proud created of SpinRite, a recovery tool from the heavens, a must see if you ever have a bad hard drive or windows corrupt on you.

the website for SpinRite and all of Steve Gibsons free tools is www.grc.com

Sunday, March 2, 2008

Another Encryption vector

Did you know you can encrypt even your email connection. I love gmail, but I can't go out and say it has been the most secure of email applications. To solve this issue check out hushmail.com, don't get scam by network solutions secure ssl certificate emails. This one is completely free and is recommended by one of the founders of nmap the port scanning utility.