"What if? Why not? Challenge the Convention! Let's do some incredible things!"
Pro Android 4
Our Android Books
Stuff I used to do
Download OSCON 2004 Presentation
Home Public Library Author Content
Can I share from Google Drive
A letter for Hampi
Are there symptoms to drinking not enough water?
On API Keys
This research on using SQLite on Android will address the following: a) How do I create a database?
How do I populate it? b) How do I read from the database? c) How do I update and delete from it? d) How do I do transactions, if allowed at all? e) Are there utilities similar to JPA or Hiberante or CoreData? f) How do I run DDL scripts? g) How do I migrate data? h) How do I create a service layer that abstracts transactions much like session beans in java?
What is CQRS?
Where Clan and Country,
Region and Religion,
Dislike and Fear
I seek hope in the lines of Rabindranath Tagore
Where the mind is without fear and the head is held high;
Where knowledge is free;
Where the world has not been broken up into fragments by narrow
Where words come out from the depth of truth;
Where tireless striving stretches its arms towards perfection;
Where the clear stream of reason has not lost its way into the
dreary desert sand of dead habit;
Where the mind is led forward by thee into ever-widening thought
Into that heaven of freedom, my Father, let my country awake.
This note will research how information is sent and received from an enterprise. What is channel level security? what is message level security? What is SSL? What is Mutual Auth? What are certificates? How is this handled in SOAP? How is this handled in REST? and perhaps more on those lines.
With this research I have learned what PKI is, What public and private keys are, what signatures are, what certificates are, what CA certificates, what SSL certificates are, how web servers manage their certificates, how web browsers manage their CA certificates, what self signing is, and more...
This note explores the differences between Channel security through SSL and Certificates and Message level security that may ride on top of that channel level security
This research is a continuation of the research from
general security guidelines research that is done prior to this. This earlier research talks about PKI, SSL, Digital Certs, https etc.
Mapping XML files to Excel files
what is wireshark? (A tool to analyze packet data!)
wjct country crossroads
Contacts, New Questions
Key content provider docs
A Poor, Stubborn, and Lazy approach to backup a Windows Laptop
This document is a collection of research notes on Android Loaders. These are managed asynchronous objects that help to retrieve data by activities and fragments as these later objects go through their life cycle. You will find here links to key guides on loaders, links to key classes, a key set of questions, answers to some or all of those questions, clarification on the order and timing of callbacks, sample code, and more notes as this documents is maintained as I know more.
Understand ListActivities, Views, and Adapters. You will explore here
overriding getView of adapters
How to make row elements clickable
How to use view holder pattern
static member classes
clicking a whole row
and parts of a row.
Providing empty views to a list control
Very Quick way to add Search to your Apps
Android coding guidelines
Tools to document reusable services/assets in an Enterprise
What is DSS (Decentralized Software Services?)
Who is Howard Pyle?
Can I count words in a Power Point presentation?
My Take on Integration
Good Film: Blended Family
A set of OK films
Good Film: Prince of Prussia
Made possible by