Read moreOnce upon a time, at a large mountainside there was an eagle nest with 4 large eagle eggs inside.
One day, an earthquake rocked the mountain causing one of the eggs to roll down to a chicken farm, located in the valley below.
The chickens knew that they must protect the eagle egg. Eventually, the eagle egg hatched and a beautiful eagle was born.
Being chickens, the chickens raised the eagle to be a chicken. The eagle loved his home and family but it seemed his spirit cried out for more.
One day, the eagle looked to the skies above and noticed a group of mighty eagles soaring. ”Oh,” the eagle cried, “I wish I could soar like those birds.”
The chickens roared with laughter, “You cannot soar like those. You are a chicken and chickens do not soar.” The eagle continued staring at his real family up above, dreaming that he could be like them.
Each time the eagle talked about his dreams, he was told it couldn’t be done.
That was what the eagle learned to believe. After time, the eagle stopped dreaming and continued to live his life as a chicken.
Finally, after a long life as a chicken, the eagle passed away.
Moral: You become what you believe you are. If you ever dream to become an eagle, follow your dreams, not the words of chickens.
Object oriented programming
Lately I’ve seen a lot of people struggling with this concept and being the very base of modern programming I think I should talk about it.
OOP, formally called Object Oriented Programming it’s a paradigm that helps the programmer to express himself in a more natural way with concepts he already knows from daily life. This also dramatically increases the level of understanding of the code written, maintainability and further code addition.
Basically you have classes with methods, properties and member variables to designate objects. This principle is called encapsulation. Methods are functions through which the user interacts with the object. Note the difference between properties and member variables. Though it’s language dependent, a property often designates a variable with GET and SET (mutator and accessor functions) and does not have memory allocated on its own however the associated filed does and a member variable or field designates a class variable. Look at the example below:
[gist id=8675207 file=OOP]
We also have at least two special functions(methods) in a class, those are the constructor and destructor, their role is to initialize the object(allocate memory in non managed languages – C++ and members initialization) and to destroy the object(free allocated memory in non managed languages, not really used in managed languages) respectively. The compiler provides an empty constructor and destructor by default, they don’t anything. Pay attention that a constructor has the same name as the class and it does not return anything. The destructor has a “~” in front and has the same name as the class. The destructor makes no sense in managed languages because the garbage collector is in charge of when an object is destroyed.
Another principle of OOP is security. Often we use access modifiers to accomplish this (private, protected, public and internal in C#).
- public – can be accessed by anyone in or outside the class.
- protected – can be accessed by anyone in the same class or in a class that inherits the containing class.
- private – can be accessed by anyone in the same class.
- internal (C# specific) – can be accessed only from the same assembly, but not other assemblies. Java has this by default in packaging.
As I already stated abstraction was the main reason of OOP, because a more natural, faster and easier way to code was needed. Programmers needed to avoid “spaghetti code” to make their programs easier to understand and easier to maintain. I will talk about inheritance a bit later as it is a vast subject and it’s language dependent(C++ allows native multiple inheritance while C# and Java require Interface to accomplish this).
Will talk about polymorphism, abstract classes, overloading and templates on a future article.
Finally some of the OOP languages out there are: C++ (C is not), PHP, Java, C#, Ruby, Python etc.
If you are anxious and want to learn faster you can find a good resource here
Opportunities for Students – ACM
Hello guys!
Today, I am speaking as an Academic Student Ambassador and I want to present you an excellent opportunity, it’s about Association for Computing Machinery (ACM).
It’s an amazing opportunity and a great resources for Computer Science students who want to better themselves. So let’s keep this straight, shall we?
The list of benefits:
- The option to subscribe to the full ACM Digital Library, with over 2 million pages of text
- Learning Center with full access to online books from Books24x7®, Morgan Kaufmann and Syngress. Full access to online courses targeted toward essential IT skills and popular certifications
- Free access to software and courseware through the ACM Student Academic Initiative (Please note: Login and valid ACM Student Membership required for access. The Developer AA package does not contain Windows 7.)
Meaning you have access to all Microsoft technologies except Windows 7. - A full year (12 issues) electronic subscription to Communications of the ACM
- A full-year (4 issues) subscription to XRDS: Crossroads, The ACM Magazine for Students
- Complimentary e-mentoring services from MentorNet®
- A full-year electronic subscription to monthly MemberNet and quarterly Student Quick Takes, ACM’s member newsletters
- A full-year subscription to TechNews, ACM’s tri-weekly IT news digest
- A full-year subscription to CareerNews, ACM’s twice monthly email career news digest
- ACM Queue magazine featuring articles, commentary, blogs, roundtables, case studies, multimedia and more
- Access to Ubiquity, ACM’s IT opinion magazine and forum, and eLearn, ACM’s magazine dedicated to distance education
- Discounts on 50+ ACM journals and magazines, and conference registration
- Email Forwarding and Filtering Service
- Special Discounts and access to valuable products and services through the ACM’s Insurance andDiscounts and Special Offers Programs
Screenshots (certifications + training):
You can also find amazing books (unique books) that costs tens or hundreds of dollars piece but you can read them for free.
Training Path that contains hundreds of training.
[spoiler title=”Training list”]
.NET Overview: Windows, Web, and the Cloud
4G Communication Systems
4G Implementations
A+ Essentials 2009: Computer Hardware Components
A+ Essentials 2009: Configuring Displays, Peripherals, Laptops, and Printers
A+ Essentials 2009: Installing Windows Operating Systems (Windows 7 update)
A+ Essentials 2009: Operational Procedures and Preventative Maintenance
A+ Essentials 2009: Security and Network Fundamentals (IPv6 update)
A+ Essentials 2009: Troubleshooting Computers and Printers
A+ Essentials 2009: Using and Managing Windows (Windows 7 update)
ANSI C Programming: Data Representation
ANSI C Programming: Expressions
ANSI C Programming: Flow Control
ANSI C Programming: Functions
ANSI C Programming: Introducing C
ANSI C Programming: Pointers
ANSI C Programming: Processing Records
ANSI C Programming: Text Processing
ANSI C Programming: The Standard Library and Preprocessor
Access Control in Windows Server 2008 R2
Active Directory Certificate Services in Windows Server 2008
Active Directory Domain Services in Windows Server 2008 R2
Active Directory Objects in Windows Server 2008
Additional Active Directory Server Roles in Windows Server 2008
Administering Linux System Tasks and Backup Strategies
Administering the X Window System
Administrative and Documentation Tasks in Linux
Advanced HTML5
Advanced Schemas
Agile Programming and Testing
Ajax API Essentials
Ajax Applications and Server Communication
Ajax Basics
Authentication, Biometrics, and Security Controls
Beyond 3G (B3G)
Black-Box Software Testing Techniques
Business Continuity, Disaster Recovery, Security Training, and Forensics
C++ Programming: Classes and Data Abstraction
C++ Programming: Files and Streams
C++ Programming: Manipulating Objects
C++ Programming: Overloading
C++ Programming: Programming Techniques
C++ Programming: Structured Programming
CEH version 7 (Part 1 of 7): Hacking Basics
CEH version 7 (Part 2 of 7): Network Hacking
CEH version 7 (Part 3 of 7): Social Engineering
CEH version 7 (Part 4 of 7): Web Application Hacking
CEH version 7 (Part 5 of 7): Wireless Hacking
CEH version 7 (Part 6 of 7): Cryptography
CEH version 7 (Part 7 of 7): Attack and Penetration Testing
CISM 2012: Information Risk Management and Compliance (Part 1)
CISM 2012: Information Risk Management and Compliance (Part 2)
CISM 2012: Information Security Governance (Part 1)
CISM 2012: Information Security Governance (Part 2)
CISM 2012: Information Security Governance (Part 3)
CISM 2012: Information Security Incident Management (Part 1)
CISM 2012: Information Security Incident Management (Part 2)
CISM 2012: Information Security Program Development and Management (Part 1)
CISM 2012: Information Security Program Development and Management (Part 2)
CISM 2012: Information Security Program Development and Management (Part 3)
CISM 2012: Information Security Program Development and Management (Part 4)
CISM 2012: Information Security Program Development and Management (Part 5)
CISSP 2012 Domain: Access Control
CISSP 2012 Domain: Business Continuity and Disaster Recovery Planning
CISSP 2012 Domain: Cryptography
CISSP 2012 Domain: Information Security Governance and Risk Management
CISSP 2012 Domain: Legal, Regulations, Investigations, and Compliance
CISSP 2012 Domain: Operations Security
CISSP 2012 Domain: Physical (Environment) Security
CISSP 2012 Domain: Security Architecture and Design
CISSP 2012 Domain: Software Development Security
CISSP 2012 Domain: Telecommunications and Network Security
Cisco ICND1 1.1: Fundamentals of Networking
Cisco ICND1 1.1: Implementing Wireless LANs
Cisco ICND1 1.1: LAN Addressing
Cisco ICND1 1.1: Managing the Network Environment
Cisco ICND1 1.1: Network Connections and Communications
Cisco ICND1 1.1: Optimizing and Troubleshooting Switch Security
Cisco ICND1 1.1: Routing and Cisco Routers
Cisco ICND1 1.1: Switching in LANs
Cisco ICND1 1.1: The Packet Delivery Process, Router Security, and Remote Access
Cisco ICND1 1.1: WAN Encapsulation and RIP Routing
Cisco ICND1 1.1: WAN Technologies
Cisco ICND2 1.1: Configuring and Troubleshooting ACLs
Cisco ICND2 1.1: EIGRP Implementation
Cisco ICND2 1.1: Frame Relay Connections
Cisco ICND2 1.1: Implementing VLANS and Trunks
Cisco ICND2 1.1: Introducing ACL Operation
Cisco ICND2 1.1: Medium-Sized Routed Network Construction
Cisco ICND2 1.1: Scaling the Network with NAT and PAT
Cisco ICND2 1.1: Securing and Troubleshooting the Switched Network
Cisco ICND2 1.1: Single-Area OSPF Implementation
Cisco ICND2 1.1: Spanning-Tree Protocol and Inter-VLAN Routing
Cisco ICND2 1.1: Transitioning to IPv6
Cisco ICND2 1.1: VPN and Point-to-Point WAN Connections
Cisco ICOMM 8.0: Administrator and End-User Interfaces
Cisco ICOMM 8.0: CUC Solutions
Cisco ICOMM 8.0: Call Flows in CUC Systems
Cisco ICOMM 8.0: Cisco Unified Communications Solution Maintenance
Cisco ICOMM 8.0: Cisco Unified Presence
Cisco ICOMM 8.0: Configuring Mobility Features
Cisco ICOMM 8.0: Enablement of Cisco Unity Connection and Voice Mailbox Options
Cisco ICOMM 8.0: End User Telephony and Mobility Features
Cisco ICOMM 8.0: Endpoint and User Administration
Cisco ICOMM 8.0: RTMT, Monitoring Voice Mail and the Disaster Recovery System
Cisco ROUTE 1.0 eLT: IPv6 Addressing and Unicast
Cisco ROUTE 1.0 eLT: IPv6 Transition Techniques
Cisco ROUTE 1.0 eLT: Implement RIPng, OSPFv3, EIGRP and Redistribution in IPv6
Cisco ROUTE 1.0 eLT: Implementing Path Control
Cisco ROUTE 1.0 eLT: NAT and PAT with IPv6
Cisco ROUTE 1.0 eLT: Routing for Branch Offices and Mobile Workers
Cisco ROUTE 1.0: Configuring and Verifying BGP operations
Cisco ROUTE 1.0: Configuring and Verifying Route Redistribution
Cisco ROUTE 1.0: Connecting the Enterprise to ISPs
Cisco ROUTE 1.0: EIGRP Authentication and Advanced Feature Implementation
Cisco ROUTE 1.0: EIGRP Implementation for the Enterprise
Cisco ROUTE 1.0: Implementing Path Control
Cisco ROUTE 1.0: Implementing an OSPF-Based Solution
Cisco ROUTE 1.0: Routing Services for Converged Networks
Cisco ROUTE 1.0: The OSPF Routing Protocol
Cisco SWITCH 1.0: Accommodating Voice and Video in Campus Networks
Cisco SWITCH 1.0: Analyzing Campus Network Designs
Cisco SWITCH 1.0: Configuring Layer 3 High Availability
Cisco SWITCH 1.0: Highly Available Networks
Cisco SWITCH 1.0: Implementing Spanning-Tree
Cisco SWITCH 1.0: Implementing VLANs in Campus Networks
Cisco SWITCH 1.0: Integrating Wireless LANs into a Campus Network
Cisco SWITCH 1.0: Inter-VLAN Routing
Cisco SWITCH 1.0: Minimizing Service Loss and Data Theft
Cisco TSHOOT 1.0 eLT: Troubleshooting Branch Office and Remote Worker Problems
Cisco TSHOOT 1.0 eLT: Troubleshooting DHCP
Cisco TSHOOT 1.0 eLT: Troubleshooting IPv6, OSPFv3, and RIPng
Cisco TSHOOT 1.0 eLT: Troubleshooting NAT and PAT
Cisco TSHOOT 1.0 eLT: Troubleshooting Network Applications Services
Cisco TSHOOT 1.0 eLT: Troubleshooting Performance Problems on Switches
Cisco TSHOOT 1.0 eLT: Troubleshooting Video Integration
Cisco TSHOOT 1.0 eLT: Troubleshooting Voice over IP Integration
Cisco TSHOOT 1.0: Maintaining and Troubleshooting Network Security Solutions
Cisco TSHOOT 1.0: Maintenance, Troubleshooting Tools, & Applications
Cisco TSHOOT 1.0: Network Layer Connectivity, OSPF, and EIGRP
Cisco TSHOOT 1.0: Planning Maintenance for Complex Networks
Cisco TSHOOT 1.0: Planning Troubleshooting Processes for Networks
Cisco TSHOOT 1.0: Route Redistribution, BGP, and Performance Issues
Cisco TSHOOT 1.0: Troubleshooting FHRPs and Performance Issues
Cisco TSHOOT 1.0: Troubleshooting VLANs, STP, and SVIs
Cisco TSHOOT v1.0 eLT Troubleshooting Wireless Integration
Cloud Computing Basics
Cloud Technology Enablers
Communications and Security in Windows Server 2008
CompTIA Network+ 2012: Network Installation and Configuration Part 1
CompTIA Network+ 2012: Network Installation and Configuration Part 2
CompTIA Network+ 2012: Network Management
CompTIA Network+ 2012: Network Media and Topologies Part 1
CompTIA Network+ 2012: Network Media and Topologies Part 2
CompTIA Network+ 2012: Network Security Part 1
CompTIA Network+ 2012: Network Security Part 2
CompTIA Network+ 2012: Network Security Part 3
CompTIA Network+ 2012: Networking Concepts Part 1
CompTIA Network+ 2012: Networking Concepts Part 2
Configuration Management, Risks, and Incidents in Software Testing
Configuring Access to Resources in Windows 7
Configuring DNS in Windows Server 2008
Configuring Hardware and Applications in Windows 7
Configuring Mobile Computing in Windows 7
Configuring Network Connectivity in Windows 7
Control Fundamentals and Security Threats
Control Project Communications (PMBOK® Guide Fifth Edition)
Controlling Changes and Closing a Project (PMBOK® Guide Fifth Edition)
Controlling Project Costs (PMBOK® Guide Fifth Edition)
Creating Secure Networks and Performing Security Assessments
Creating User Interfaces for Windows Applications with C# 2010
Creating User Interfaces for Windows Applications with Visual Basic 2010
Creating Windows Applications with C# 2010
Creating the Work Breakdown Structure (PMBOK® Guide Fifth Edition)
Cryptography and Public Key Infrastructures
Customizing and Managing Multithreaded Applications with C# 2010
Customizing and Managing Multithreaded Applications with Visual Basic 2010
DHTML and Cascading Style Sheets
Data Management, Localization, and Encryption in Linux
Defining and Sequencing Project Activities (PMBOK® Guide Fifth Edition)
Deploying Windows 7
Design for Six Sigma in the Organization
Designing and Maintaining LDAP Directory Services
Developing an Application Using User-Centered Design
Developing and Controlling the Project Schedule (PMBOK® Guide Fifth Edition)
Digital Payments
Direct, Monitor, and Control Project Work (PMBOK® Guide Fifth Edition)
Discovery, Routing, and RESTful Services in WCF 4 Applications with C# 2010
E-mail and Security in Linux
EMC Storage Products
Enterprise Data and Cloud Interaction
Estimating Activity Resources and Durations (PMBOK® Guide Fifth Edition)
Extending XML
Fibre Channel Storage Area Networks
Fundamentals of Software Testing
General Coding Best Practices
Getting Started with ADO.NET 4 Connections and Commands Using C# 2010
Getting Started with ADO.NET 4 DataSets Using C# 2010
Getting Started with Software Programming
Getting Started with WCF 4 Using C# 2010
Group Policy Objects Strategy in Windows Server 2008
Hardware Configurations for Linux
Hardware Requirements
IP Mobility
IP SANs and Content Addressed Storage
IPv6
ITIL® 2011 Edition Foundation: Continual Service Improvement
ITIL® 2011 Edition Foundation: ITIL® and the Service Lifecycle
ITIL® 2011 Edition Foundation: Introduction to Service Operation
ITIL® 2011 Edition Foundation: Service Design Fundamentals
ITIL® 2011 Edition Foundation: Service Design Processes
ITIL® 2011 Edition Foundation: Service Operation Processes
ITIL® 2011 Edition Foundation: Service Strategy Fundamentals
ITIL® 2011 Edition Foundation: Service Strategy Processes
ITIL® 2011 Edition Foundation: Service Transition Processes and Policies
ITIL® 2011 Edition Overview: Certification and Benefits
ITIL® 2011 Edition Overview: Creating a Service Culture
ITIL® 2011 Edition Overview: Introduction to the ITIL® Framework
Identifying Project Risks (PMBOK® Guide Fifth Edition)
Identity, Presence, and Privacy
Improvements to Role Services in Windows Server 2008 R2
Information Availability
Installing Linux
Installing, Upgrading, and Migrating to Windows 7
Integrated Initiation and Planning (PMBOK® Guide Fifth Edition)
Intelligent Storage Systems
Introducing Agile Software Development
Introducing Cloud Computing
Introducing User-Centered Design
Introduction to HTML5 and CSS3
Introduction to Hibernate
Introduction to Information Security
Introduction to Java EE 6
Introduction to Programming for Mobile Applications – Developing an Application for Android
Introduction to Programming for Mobile Applications – Developing an Application for iPhones
Introduction to Programming for Mobile Applications – Introducing Mobile Technology and Applications
Introduction to Ruby on Rails
Introduction to Software Program Design
Introduction to Storage Technology
Java Programming with Java SE 6.0: Basic GUI Development in Java
Java Programming with Java SE 6.0: Creating Classes in Java
Java Programming with Java SE 6.0: Exception Handling and Assertions
Java Programming with Java SE 6.0: Generics and Annotations
Java Programming with Java SE 6.0: Getting Started with Java
Java Programming with Java SE 6.0: Java Applets
Java Programming with Java SE 6.0: Java I/O
Java Programming with Java SE 6.0: Java Utilities
Java Programming with Java SE 6.0: Operators and Flow Control in Java
Java Programming with Java SE 6.0: Reference Types and Threading
Java Programming with Java SE 6.0: Working with Classes in Java
Java SE7 Fundamentals: Decision Constructs, Arrays, and Loops
Java SE7 Fundamentals: Handling Errors and Deploying Applications
Java SE7 Fundamentals: Introduction to Java
Java SE7 Fundamentals: Overloading, Validation, and Object-Oriented Concepts
Java SE7 Fundamentals: Variables, Operators, and Objects
Java SE7 New Features: I/O, Network, and Desktop Enhancements
Java SE7 New Features: Java Language and Technology Enhancements
Java SE7 Professional: File I/O, Concurrency, JDBC, and Localization
Java SE7 Professional: Generics, Errors, and I/O
Java SE7 Professional: Syntax and Class Design
JavaScript Language Basics
JavaScript: Advanced Browser Scripting and DHTML
JavaScript: Browser Scripting Fundamentals
JavaScript: Functions and Regular Expressions
JavaScript: Objects and Object-oriented Programming
LDAP Fundamentals
Linux File Sharing and Filesystem Management
Linux Filesystem Management and File Sharing
Linux Hardware Configuration and System Maintenance
Linux Kernel Compilation and Linux Startup
Linux Kernel Compilation and System Startup
Linux Network Configuration
Linux Network Services
Linux Networking Configuration
Linux Networking Services
Linux Security
Linux System Customization and Automation
Linux System Maintenance and Hardware Configuration
Linux System Troubleshooting
Linux Troubleshooting
Linux User Notification and Device Management
Mail Transfer Agents and Accessibility in Linux
Maintaining Quality Code
Making Content Dynamic with DHTML
Management Improvements in Windows Server 2008 R2
Managing ADO.NET 4 Connections and Commands with C# 2010
Managing Agile Software Development
Managing Debian and Red Hat Packages
Managing Files in Linux
Managing Linux User and Group Accounts
Managing Procurements (PMBOK® Guide Fifth Edition)
Managing Project Human Resources (PMBOK® Guide Fifth Edition)
Managing Projects within Organizations (PMBOK® Guide Fifth Edition)
Managing and Controlling Stakeholder Engagement (PMBOK® Guide Fifth Edition)
Managing and Processing Text
Manipulating XML with the XML DOM and Ajax
Microsoft .NET Framework 4.0: ASP.NET MVC 2 with VB 2010
Microsoft .NET Framework 4.0: Client-Side Scripting and AJAX with VB 2010
Microsoft .NET Framework 4.0: Configuring and Deploying Web Applications with VB 2010
Microsoft .NET Framework 4.0: Data Integration with VB 2010
Microsoft .NET Framework 4.0: Web Application Optimization and Customization with VB 2010
Microsoft .NET Framework 4.0: Web Applications with Visual Studio 2010 and Visual Basic 2010
Microsoft .NET Framework 4.0: Web Form Controls with VB 2010
Microsoft .NET Framework 4: ASP.NET MVC 2 with C# 2010
Microsoft .NET Framework 4: Client-Side Scripting and AJAX with C# 2010
Microsoft .NET Framework 4: Configuring and Deploying Web Applications with C# 2010
Microsoft .NET Framework 4: Data Integration with C# 2010
Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with C# 2010
Microsoft .NET Framework 4: Debugging, Tracing and Monitoring Web Applications with VB 2010
Microsoft .NET Framework 4: Web Application Optimization and Customization with C# 2010
Microsoft .NET Framework 4: Web Applications with Visual Studio 2010 and Visual C# 2010
Microsoft SQL Server 2012: Creating Database Objects
Microsoft SQL Server 2012: Creating Functions and Triggers
Microsoft SQL Server 2012: Creating Programming Objects and Optimizing Queries
Microsoft SQL Server 2012: Managing XML Data
Microsoft SQL Server 2012: Manipulate Data Using Operators and Functions
Microsoft SQL Server 2012: Querying Basics and Modifying Data
Microsoft Windows 7: First Look for IT Professionals
Microsoft Windows Server 2008 R2 Hyper-V: Deploying VMs Using Templates
Microsoft Windows Server 2008 R2 Hyper-V: High Availability and Recoverability
Microsoft Windows Server 2008 R2 Hyper-V: Implementing Remote Desktop Services
Microsoft Windows Server 2008 R2 Hyper-V: Installing Hyper-V
Microsoft Windows Server 2008 R2 Hyper-V: Introduction and Planning Overview
Microsoft Windows Server 2008 R2 Hyper-V: Manage & Optimize the Hyper-V Server
Microsoft Windows Server 2008 R2 Hyper-V: Migration, Creation, and Management
Microsoft Windows Server 2008 R2 Hyper-V: Monitoring and Managing Environments
Microsoft Windows Server 2008 R2 Hyper-V: Networking and Remote Administration
Microsoft Windows Server 2008 R2 Hyper-V: Remote Desktop Virtualization Roles
Microsoft.NET Framework 4: Web Form Controls with C# 2010
Migrating Infrastructure to the Cloud
Mobile IP
Monitoring and Controlling Project Scope (PMBOK® Guide Fifth Edition)
Monitoring and Managing the Data Center
Monitoring, Backing Up, and Restoring Windows 7 Systems
Monitoring, Backups, and Recovery in Windows Server 2008
Mounting and Managing File Systems
Moving Business Services into the Cloud
Network Protocols, Attacks, and Defenses
Network Storage Systems
Network and System Security Mechanisms
Networking Fundamentals in Linux
Networking Services in Linux
Non-Cellular Wireless Technology
Object-oriented Coding Best Practices
Oracle Database 11g Release 2: Backup and Recovery
Oracle Database 11g Release 2: Database Architecture and Installation
Oracle Database 11g Release 2: Database Architecture and Recovery Operations
Oracle Database 11g Release 2: Database Creation and Instance Management
Oracle Database 11g Release 2: Database Diagnostics and Flashback Technologies
Oracle Database 11g Release 2: Managing Concurrency, Undo, and Auditing
Oracle Database 11g Release 2: Managing Database Maintenance and Performance
Oracle Database 11g Release 2: Managing Database Memory and Performance
Oracle Database 11g Release 2: Managing Database Resources and the Scheduler
Oracle Database 11g Release 2: Managing Database Space and Duplication
Oracle Database 11g Release 2: Moving Data and Oracle Support
Oracle Database 11g Release 2: Performing Restore and Recovery Tasks
Oracle Database 11g Release 2: Storage Structures and User Security
Oracle Database 11g Release 2: The ASM Instance and Network Connectivity
Oracle Database 11g Release 2: The RMAN Catalog and Creating Backups
Oracle Database 11g Release 2: Using, Monitoring and Tuning RMAN
Oracle Database 11g: Basic User and Strong Authentication
Oracle Database 11g: Controlling User Access and Managing Schema Objects
Oracle Database 11g: Conversion Functions, Group Functions, and Joins
Oracle Database 11g: Data Dictionary Views and Large Data Sets
Oracle Database 11g: Database Auditing
Oracle Database 11g: Database Security
Oracle Database 11g: Encryption Concepts
Oracle Database 11g: Enterprise User Security and Proxy Authentication
Oracle Database 11g: Firewalls, Oracle Connection Manager, and SQL*Plus Security
Oracle Database 11g: Getting Started With PL/SQL
Oracle Database 11g: Introduction to Database Security and Solutions
Oracle Database 11g: Managing Data in Different Time Zones
Oracle Database 11g: Managing PL/SQL Code and Dependencies
Oracle Database 11g: Oracle Label Security and the Data Masking Pack
Oracle Database 11g: Oracle Net Services and Listener Security
Oracle Database 11g: PL/SQL Code and Dependency Management
Oracle Database 11g: PL/SQL Variables, Attributes, and Executable Statements
Oracle Database 11g: Packages, Dynamic SQL, and Coding Considerations
Oracle Database 11g: Packages, Dynamic SQL, and Coding Considerations in PL/SQL
Oracle Database 11g: Privileges, Roles, and Application Contexts
Oracle Database 11g: Subprograms, Packages, and Exception Handling
Oracle Database 11g: Subprograms, Packages, and Exception Handling in PL/SQL
Oracle Database 11g: Subqueries, Set Operators, and Data Manipulation
Oracle Database 11g: Transparent Data Encryption
Oracle Database 11g: Using DDL, Views, Sequences, Indexes, and Synonyms
Oracle Database 11g: Using DML, DDL, Cursors, Loops, and Control Structures
Oracle Database 11g: Using DML, DDL, Cursors, Control Structures, and Loops
Oracle Database 11g: Using Data Types, INDEX BY Tables, and Cursors
Oracle Database 11g: Using Data Types, INDEX BY Tables, and Cursors in PL/SQL
Oracle Database 11g: Using Exceptions, Subprograms, JDeveloper, and REF Cursors
Oracle Database 11g: Using SQL to Query Your Database
Oracle Database 11g: Using Subqueries and Regular Expressions
Oracle Database 11g: Using Triggers and the PL/SQL Compiler
Oracle Database 11g: Using Triggers, the PL/SQL Compiler, and Managing Code
Oracle Database 11g: Virtual Private Database
Oracle Database 11g: Working with Exceptions, Subprograms, JDeveloper, and REF Cursors
PHP: An Introduction
PHP: An Introduction (Linux)
Partitions, File Systems, and Disk Quotas
Performing Risk Analysis (PMBOK® Guide Fifth Edition)
Perl Language Fundamentals
Physical Disks and RAID Arrays
Plan Quality Management (PMBOK® Guide Fifth Edition)
Plan and Manage Project Communications (PMBOK® Guide Fifth Edition)
Planning Project Costs (PMBOK® Guide Fifth Edition)
Planning Project Human Resources (PMBOK® Guide Fifth Edition)
Planning Project Procurement Management (PMBOK® Guide Fifth Edition)
Planning an Agile Software Development Project
Practical Examples of User-Centered Design
Printing in Linux
Programming Techniques and Strategies
Project Management Overview (PMBOK® Guide Fifth Edition)
Project Management Process Groups (PMBOK® Guide Fifth Edition)
Project Requirements and Defining Scope (PMBOK® Guide Fifth Edition)
Project Stakeholder Management (PMBOK® Guide Fifth Edition)
Providing Cloud Security
Quality Assurance and Quality Control (PMBOK® Guide Fifth Edition)
Querying XML Data with XPath and XQuery
Querying, Navigating, and Linking XML Data
Redirection Approaches and Process Control
Remote Access and Wireless Security
Replication and Business Continuity
Risk Management Planning (PMBOK® Guide Fifth Edition)
Risk Response and Control (PMBOK® Guide Fifth Edition)
SAP Business One – Introduction for End Users
SAP BusinessObjects: Business Intelligence
SAP BusinessObjects: Crystal Reports
SAP BusinessObjects: Dashboards and Analytics
SAP BusinessObjects: InfoView
SAP BusinessObjects: Overview
SAP BusinessObjects: Web Intelligence
SQL Server 2008 R2: Creating and Altering Partitions
SQL Server 2008 R2: Creating and Implementing Database Objects
SQL Server 2008 R2: Gathering Performance Data
SQL Server 2008 R2: Implementing Programming Objects
SQL Server 2008 R2: Messaging, Full-Text Search, Scripts, and Track Changes
SQL Server 2008 R2: Performing Advanced Query Techniques
SQL Server 2008 R2: Querying and Managing XML Data
SQL Server 2008 R2: Running Queries and Manipulating Data
Securing Applications, Virtualized Environments, and Cloud Computing
Securing Storage
Securing and Deploying WPF Applications with C# 2010
Securing and Deploying WPF Applications with Visual Basic 2010
Securing and Managing a WCF 4 Application with C# 2010
Securing the IT Environment
Security in a Linux Environment
Security in the Linux Environment
Six Sigma and Lean in the Organization
SkillSoft Books 24 X 7
SkillSoft Guided Tour
Software Program Control Flow Fundamentals
Software Test Management
Stabilizing and Deploying SharePoint 2010 Components
Starting to Program with Perl
Static Techniques and Test Design in Software Testing
Storage Security
Storage System Architecture
Storage Technologies Update
Storage Virtualization
Storage Virtualization Technologies
Structuring XML with Schemas
Synchronizing Data and Managing ADO.NET 4 Applications with C# 2010
TestPrep Final Exam: ANSI C Programming
TestPrep Final Exam: C++ programming
Testing Throughout the Software Life Cycle
The Active Directory Infrastructure in Windows Server 2008
The Iterative Process in User-Centered Design
The Linux Kernel
Tool Support in Software Testing
Transforming and Formatting XML
UNIX Fundamentals: Files and Directories
UNIX Fundamentals: Network Administration
UNIX Fundamentals: Overview
UNIX Fundamentals: Security
UNIX Fundamentals: Shell Scripting Basics
Updating ADO.NET DataSets with C# 2010
Using LINQ and XML with ADO.NET 4 and C# 2010
Using the Linux Shell
VMware Datacenter Overview
VMware Desktop Overview
VMware Server Overview
VMware Workstation 7: Getting started with Virtual Machines
VMware Workstation 7: Managing Virtual Machines
Viewing and Navigating Data with ADO.NET 4 DataSets Using C# 2010
Virtualization with VMware: An Overview
WCF 4 Contracts, Behaviors, and Data Management Using C# 2010
Web Services and XML
White-Box Software Testing Techniques
Windows Application Development with Visual Basic 2010
Windows Applications Content Creation and Management with C# 2010
Windows Applications Content Creation and Management with Visual Basic 2010
Windows Applications Databinding with C# 2010
Windows Applications Databinding with Visual Basic 2010
Working with Forms, the Canvas, and Media in HTML5
Working with Sendmail and Apache
Working with the ADO.NET Entity Framework 4 Using C# 2010
Writing Shell Scripts in Linux
XML APIs
XML Language Basics
XML Transformation Using XSLT and XSL-FO
[/spoiler]
I think it’s a pretty great opportunity. How much does it cost ?
It costs $42/year for all countries but the less developed countries for which the subscription cost is lower ($32 – Romania).
List of less developed countries.
Subscribe NOW and make use of the largest and most respected community of Students and IT Professionals around the word.
Website: www.acm.org
Started a blog!
Hello there!
My name is Emanuel Scirlet, some of you may know me as emi and I am Computer Science student though I involved myself in various projects.
Some of you may well know me from the Data-Soft project or from the day to day to life, either way welcome to my blog!
First thing I want to say is that it has been an interesting year, I gained a lot, I lost here and there but definitely learned a lot.
I would say that the Data-Soft project was the main project last year, not only that I had the chance to meet great people but also a chance to know more about myself.
Though we had a great team and we did really great things together the project came to an end mainly due to the fact that people didn’t have enough time anymore to dedicate to the project.
Probably the most important thing I learned the way is that is extremely important to pass on knowledge and help create a better place for ourselves(yep it’s me talking)
Personally I had the chance to play with C# and some really advanced C++ and Windows APIs along the way, but in a fun environment without stress and deadlines. I strongly believe you really need to enjoy what you are doing in order to succeed!
So why did I start this blog?
Well, because I want to pass on some of my knowledge, give away opportunities for other student from around world and tips for rookies.
I will not be talking much about me in this post, more info about me you can find in About me section.
Of course if you have a project you want advice or questions do not hesitate to contact me, I’ll be glad to help!
So what will be covering on this blog?
Mainly tech subjects: algorithms, developing apps, tipps, main tech events, opportunities for students and much more!
As of today the area of languages covered will be C/C++, C#, Java but that is subject of change(RoR maybe included, ASP..)
Occasionally guest stars will have a chance to write an article on a subject on my blog. Guest stars include other students from universities across the globe, people I know, people I worked with and last but not least IT Professionals working out there in the most prestigious companies giving you insights.
As for the language I will be writing on this blog is English mainly because the blog is dedicated to students across the globe but posts in German or Romanian are not excluded.
I really have some great opportunities for you, students at CS!
I am looking forward to get in touch with you!