Java Tools: the Next Battleground Ides Seen As Way to Lure Developers by YVONNE L

Total Page:16

File Type:pdf, Size:1020Kb

Java Tools: the Next Battleground Ides Seen As Way to Lure Developers by YVONNE L Java Tools: The Next Battleground IDEs seen as way to lure developers BY YVONNE L. LEE services product management, MAY 15, 2004 Five months after the Java said his company is “coming on ISSUE NO. 102 CA’S DEVELOPMENT TOOLS TO Community Process approved strong, too.” version 1.4 of the Java 2 Enter- In fact, while 40 percent and ITAA Says Offshoring Good prise Edition specification, Sun 35 percent of respondents in a For U.S. Economy, Workers . .5 COME UNDER ALLFUSION BRAND Microsystems Inc. held a “kick- November 2003 BZ Research Embarcadero Adds Executive shakeup won’t affect product line off” event to highlight commu- study said they used IBM Corp.’s Collaboration, Architecture BY DAVID RUBINSTEIN analyst who now is CA’s director nity support for the new spec. It WebSphere or BEA’s WebLogic, Features to Data Modeler . .5 The recent corporate shakeup of business strategy for the life- also pointed out the next Java respectively, another 31 percent SlickEdit Makes at Computer Associates Inter- cycle management business battleground: tools. said they used Oracle’s applica- Refactoring Reality national Inc. will not affect the unit, said those development “The runtime wars are over,” tion server. Multiple responses For C++ Programmers . .6 company’s long-term strategy tools that are going to be said BEA Systems Inc. deputy were permitted. BZ Research is regarding its development advanced will carry the AllFu- CTO Benjamin Renaud, dis- a subsidiary of BZ Media LLC, IBM Shifting tools, as it plans to announce sion brand, while those that missing the competitive history publisher of SD Times. Toward SOA . .8 a consolidation of those tools only will be supported for exist- of J2EE app servers. “It’s IBM But as application servers WebSphere Studio under the AllFusion brand at ing customers will not. He and BEA. So, tools is where a lot have become more commodi- Gets Faces Lift . 8 the upcoming CA World user would not list which products of the innovation is.” tized in the larger J2EE stacks Start-Up Agitar Aims conference in Las Vegas. will not be advanced. But Rob Clark, director of these large vendors offer, tools To Ease Developer Questions arose about the An accounting scandal Oracle Corp.’s J2EE and Web > continued on page 17 Agitation Over Testing . .10 future of the developer prod- brought down former CEO Snapbridge Snaps Out ucts when recent interviews Sanjay Kumar, who was re- XML IDE, Server . 11 from newly appointed high- placed last month on an interim ranking officials spotlighted the basis by former Vivendi Uni- Elementool’s Bug Tracking Unicenter, BrightStor and versal Games CEO and CMP Adds Unlimited Fields . .12 eTrust brands but made no Media LLC president of pub- RadView’s TestView mention of the developer tools. lishing Kenneth Cron. Kumar Combines Performance John Meyer, the former will remain at CA as chief soft- and Load Tests . .12 Giga and Forrester Research ware architect. ❚ Start-Up N8 Systems Believes a Thousand Words Demand a Picture . .13 TeamTrack for ChangeMan The Selling of Sarbanes-Oxley The Best ZMF Missing Unix Link . .15 Vendor hype aside, it’s not a new tool category Uniface Now Can Of the Best Consume Web Services . .15 BY JENNIFER DEJONG Chuck Ames, CEO of InstallShield X The Sarbanes-Oxley act The precise business process manage- Merges DevStudio, doesn’t say a word about impact on ment software company MultiPlatform Tools . .16 software, but a growing developers of Oak Grove Systems Inc., number of vendors are in Calabasas, Calif. Sonic’s Claims For hoping the legislation will the complex Given the complexity, SonicMQ 6 Go Boom . .21 help them sell more of it. legislation is there is no such thing as a ICEsoft Spun Out Of Using terms such as single tool that enables a Michael Oxley, left, not yet clear. Wind River’s Tornado . .23 “Sarbanes-Oxley accelera- and Paul Sarbanes. company to comply with Birdstep Aligns RDM tor,” they are bombarding SD Times photo illustration the bill, said Patrick J. Mobile With Embedded . .23 developers with pitches for Hagerty, a vice president at McGartland, vice president of software that will help public AMR Research Inc., in Boston. business development at Meri- Metrowerks Tools To companies comply with the law, “In an environment of fear, dio Inc., a Chicago company Play Host to Linux . 23 enacted in the wake of high- uncertainty and doubt, vendors that sells document and records A BZ MEDIA PUBLICATION $7.95 profile accounting scandals. are saying, ‘Use my software.’ ” management software. “There is a whole lot of market- For developers, that message Product offerings fall into www.sdtimes.com ing going on here,” said John is confusing at best. Because two categories: document and Sarbanes-Oxley, formally known records management; and busi- as the U.S. Public Company ness process management Accounting Reform and (BPM). Both types of software Investor Protection Act of 2002, are being used to help compa- is a complex piece of legislation nies comply with the bill co- broadly aimed at preventing cor- authored by Sen. Paul Sar- porate fraud, its precise impact banes, D-Md., and Rep. is not yet clear. “There’s a mad Michael Oxley, R-Ohio. page 25 scramble to figure that out,” said > continued on page 21 www.sdtimes.com Software Development Times May 15, 2004 NEWS 5 ITAA Says Offshoring Good for U.S. Economy, Workers BY JENNIFER DEJONG conducted by Waltham, Mass.- ment in new IT projects and The worldwide sourcing of com- based economic research firm services and creating new jobs. THE INFORMATION TECHNOLOGY puter software and services actu- Global Insight Inc., “The “The U.S. IT work force will ASSOCIATION OF AMERICA ally will increase the number of Impact of Offshore IT Soft- continue to grow,” said ITAA U.S. jobs, improve real wages for ware and Services Outsourcing president Harris Miller. But What It Is: The ITAA is an Arlington, Va.-based, member-funded American workers and benefit on the U.S. Economy and the some of the study’s own data trade association that promotes the interests of the U.S. infor- the U.S. economy overall, IT Industry” determined that appears to contradict Global mation technology industry. according to a study by the Infor- from 2003 to 2008, total sav- Insight’s conclusion that off- Members: Over 400, including Adobe Systems Inc., Amazon.com, mation Technology Association ings from the use of offshore shoring benefits U.S. IT work- Computer Associates International Inc., Dell Inc., eBay Inc., IBM of America (ITAA), a trade asso- resources are estimated to ers. For instance, the study Corp., Intel Corp., Macromedia Inc., Microsoft Corp., Oracle Corp., ciation based in Arlington, Va. grow from US$6.7 billion to found that in the software and PeopleSoft Inc., Sanctum Inc. and SAP America. Funded by the ITAA and $20.9 billion, spurring invest- services area, the economy will Current Initiatives: Evaluating the impact of the Health Informa- create 516,000 jobs over the INTERNATIONAL OUTSOURCING: tion Portability and Accountability Act (HIPAA) on IT companies, next five years in an environ- promoting benefits of wireless data and voice technologies for HOW IT WILL HELP THE ECONOMY ment with global sourcing, but federal organizations, and prohibiting state and local taxing juris- only 490,000 without it. But of dictions from taxing Internet access services or goods and ser- Spending for global sourcing of computer software and services these 516,000 new jobs, 272,000 vices sold online. Source: www.itaa.org is expected to grow at a compound annual rate of almost 26 per- will go offshore and only cent, from US$10 billion in 2003 to $31 billion in 2008. 244,000 will remain onshore. Asked to clarify the apparent business investment, more During the same period, total savings from the use of offshore The study, released at the end contradiction, ITAA senior vice exports, more jobs, and higher resources are estimated to grow from $6.7 billion to $20.9 billion, of March, cites those numbers as president Bob Cohen did not. real wages—than in an environ- driving investment in new IT projects. evidence that global sourcing He said in a statement: “The ment without offshore IT soft- The benefits of global sourcing contribute significantly to real will create more U.S. IT jobs. study shows that off-shore IT ware and services outsourcing.” gross domestic product (GDP) in the United States, adding $33.6 But given that all 490,000 jobs software and services outsourc- According to an April 12 arti- billion in 2003. By 2008, real GDP is expected to be $124.2 billion created without global sourcing ing yields benefits to the U.S. cle in The Wall Street Journal, higher than it would be in an environment in which offshore IT would be in the U.S., the net economy—lower costs, higher the statistics available on global software and services outsourcing does not occur. gain for the U.S. appears to productivity, lower inflation, outsourcing are sketchy. The Source: Information Technology Association of America be greater without offshoring. more consumer spending, more > continued on page 14 been included to help archi- tects redefine database designs Embarking on a Trip Into the Enterprise and ensure those modifications Embarcadero revs data modeler with collaboration, architecture features make their way back into the corporate data stores. BY DAVID RUBINSTEIN enterprise modeling solutions. most used and automates the how to model data warehouses The changes to E/R Reposi- There is data, and then there is Keller said one of four key creation of binds and associa- with rich rules within an organi- tory are in its data dictionary DATA.
Recommended publications
  • QATAR ASW ONLINE SCRIPT V.8.0 Pages
    “DEXIGN THE FUTURE: Innovation for Exponential Times” ARNOLD WASSERMAN COMMENCEMENT ADDRESS VIRGINIA COMMONWEALTH UNIVERSITY IN QATAR 2 MAY 2016 مساء الخير .Good afternoon It is an honor to be invited to address you on this important day. Today you artists and designers graduate into the future. Do you think about the future? Of course you do. But how do you think about the future? Is the future tangible - or is it intangible ? Is it a subject for rational deliberation? Or is it an imagined fantasy that forever recedes before us? Is the future simply whatever happens to us next? Or is it something we deliberately create? Can we Dexign the Future? What I would like us to think about for the next few moments is how creative professionals like yourselves might think about the future. What I have to say applies as much to art as it does to design. Both are technologies of creative innovation. I will take the liberty here of calling it all design. My speech is also available online. There you can follow a number of links to what I will talk about here. The future you are graduating into is an exponential future. What that means is that everything is happening faster and at an accelerating rate. For example, human knowledge is doubling every 12 months. And that curve is accelerating. An IBM researcher foresees that within a few years knowledge will be doubling every 12 hours as we build out the internet of things globally. This acceleration of human knowledge implies that the primary skill of a knowledge worker like yourself is research, analysis and synthesis of the not-yet-known.
    [Show full text]
  • Planning Guide
    Oracle AutoVue 20.2, Client/Server Deployment Planning Guide March 2012 Copyright © 1999, 2012, Oracle and/or its affiliates. All rights reserved. Portions of this software Copyright 1996-2007 Glyph & Cog, LLC. Portions of this software Copyright Unisearch Ltd, Australia. Portions of this software are owned by Siemens PLM © 1986-2012. All rights reserved. This software uses ACIS® software by Spatial Technology Inc. ACIS® Copyright © 1994-2008 Spatial Technology Inc. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Govern- ment, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "com- mercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations.
    [Show full text]
  • RDM Embedded 10-Dataflow-Datasheet
    RDMe DataFlow™ Product Data Sheet Raima Database Manager (RDM) Embedded DataFlow™ extension provides additional reliability to our time tested and dependable RDM database engine. In this DataFlow solution we have added functionality that will enable embedded system developers to develop sophisticated applications capable of moving information collected on the smallest devices up to the largest enterprise systems. Overview: In today’s world the need for the flow of information throughout the many levels of an organization is becoming even more essential to the success of a business. Tradition- ally, embedded applications have been closed systems completely isolated from the enterprise infrastructure. Typically, if data from a device is allowed into the enterprise Key New Features: the movement of the data is done via off line batch processing at periodic time Master-Slave Replication intervals. It often takes hours for these batch processes to complete, rendering the information out of date by the time it reaches key decision makers. RDM Embedded 3rd Party Database DataFlow allows for the safe real-time movement of data captured on the shop floor to Replication flow up to the enterprise providing instant actionable information to decision makers. Key Functionality: Key Benefits: Master-Slave Replication Host 1 Host 2 Host 4 Application Reliability Create applications that replicate Application data between different R R Performance e e p p l l i i c c databases on different systems, a a t t i i Efficiency In Memory o o In-Memory n n R Database E E Database e on the same system, in memory p n n l g g i c i i n n Innovation a e e t i and on disk.
    [Show full text]
  • Dynamic Integration of Mobile JXTA with Cloud Computing for Emergency Rural Public Health Care
    Osong Public Health Res Perspect 2013 4(5), 255e264 http://dx.doi.org/10.1016/j.phrp.2013.09.004 pISSN 2210-9099 eISSN 2233-6052 - ORIGINAL ARTICLE - Dynamic Integration of Mobile JXTA with Cloud Computing for Emergency Rural Public Health Care Rajasekaran Rajkumar*, Nallani Chackravatula Sriman Narayana Iyengar School of Computing Science and Engineering, VIT University, Vellore, India. Received: August 21, Abstract 2013 Objectives: The existing processes of health care systems where data collection Revised: August 30, requires a great deal of labor with high-end tasks to retrieve and analyze in- 2013 formation, are usually slow, tedious, and error prone, which restrains their Accepted: September clinical diagnostic and monitoring capabilities. Research is now focused on 3, 2013 integrating cloud services with P2P JXTA to identify systematic dynamic process for emergency health care systems. The proposal is based on the concepts of a KEYWORDS: community cloud for preventative medicine, to help promote a healthy rural ambulance alert alarm, community. We investigate the approaches of patient health monitoring, emergency care, and an ambulance alert alarm (AAA) under mobile cloud-based cloud, telecare or community cloud controller systems. JXTA, Methods: Considering permanent mobile users, an efficient health promotion mHealth, method is proposed. Experiments were conducted to verify the effectiveness of P2P the method. The performance was evaluated from September 2011 to July 2012. A total of 1,856,454 cases were transported and referred to hospital, identified with health problems, and were monitored. We selected all the peer groups and the control server N0 which controls N1,N2, and N3 proxied peer groups.
    [Show full text]
  • Simula Mother Tongue for a Generation of Nordic Programmers
    Simula! Mother Tongue! for a Generation of! Nordic Programmers! Yngve Sundblad HCI, CSC, KTH! ! KTH - CSC (School of Computer Science and Communication) Yngve Sundblad – Simula OctoberYngve 2010Sundblad! Inspired by Ole-Johan Dahl, 1931-2002, and Kristen Nygaard, 1926-2002" “From the cold waters of Norway comes Object-Oriented Programming” " (first line in Bertrand Meyer#s widely used text book Object Oriented Software Construction) ! ! KTH - CSC (School of Computer Science and Communication) Yngve Sundblad – Simula OctoberYngve 2010Sundblad! Simula concepts 1967" •# Class of similar Objects (in Simula declaration of CLASS with data and actions)! •# Objects created as Instances of a Class (in Simula NEW object of class)! •# Data attributes of a class (in Simula type declared as parameters or internal)! •# Method attributes are patterns of action (PROCEDURE)! •# Message passing, calls of methods (in Simula dot-notation)! •# Subclasses that inherit from superclasses! •# Polymorphism with several subclasses to a superclass! •# Co-routines (in Simula Detach – Resume)! •# Encapsulation of data supporting abstractions! ! KTH - CSC (School of Computer Science and Communication) Yngve Sundblad – Simula OctoberYngve 2010Sundblad! Simula example BEGIN! REF(taxi) t;" CLASS taxi(n); INTEGER n;! BEGIN ! INTEGER pax;" PROCEDURE book;" IF pax<n THEN pax:=pax+1;! pax:=n;" END of taxi;! t:-NEW taxi(5);" t.book; t.book;" print(t.pax)" END! Output: 7 ! ! KTH - CSC (School of Computer Science and Communication) Yngve Sundblad – Simula OctoberYngve 2010Sundblad!
    [Show full text]
  • Solving Quarto with JXTA and JNGI
    Solving Quarto with JXTA and JNGI Matthew Shepherd University of Texas at Austin Abstract. This paper presents an implementation of a grid-based autonomous quarto player. The implementation uses the JNGI framework which itself is written on top of JXTA. 1 Introduction Quarto is a game reminiscent of tic-tac-toe. It is played with sixteen unique pieces on a four-by-four square board. Each piece is large or small, black or white, solid or hollow and square or round. The game begins with an empty board and all sixteen pieces available. Two players take successive turns with the first player choosing an available piece. That piece is given to the second player who places it on an empty spot on the board. The roles reverse and the process repeats. A player wins by placing the final piece in a row, column or diagonal where all four pieces have at least one attribute in common. For example, the winner might place a piece that completes a row of four black pieces or a column of four round pieces. My goal was to write an implementation of the game and an autonomous program for a human player to compete against. The program performs an exhaustive search of possible moves in order to find the most appropriate one. If the program were to perform the search on the first move of the game, the sixteen available pieces and sixteen empty squares would combine to produce a (16!)^2 search space. Eliminating the moves that take place after a game has already been won reduces that number, but a single processor would still not be sufficient to perform such a task in a reasonable amount of time.
    [Show full text]
  • Devpartner Java Edition Getting Started Guide
    DevPartner Java Edition Getting Started Guide Release 4.5 Copyright © 2001–2009 Micro Focus (IP) Ltd. All rights reserved. Micro Focus (IP) Ltd. has made every effort to ensure that this book is correct and accurate, but reserves the right to make changes without notice at its sole discretion at any time. The software described in this document is supplied under a license and may be used or copied only in accordance with the terms of such license, and in particular any warranty of fitness of Micro Focus software products for any particular purpose is expressly excluded and in no event will Micro Focus be liable for any consequential loss. Animator®, COBOLWorkbench®, EnterpriseLink®, Mainframe Express®, Micro Focus®, Net Express®, REQL® and Revolve® are registered trademarks, and AAI™, Analyzer™, Application Quality Workbench™, Application Server™, Application to Application Interface™, AddPack™, AppTrack™, AssetMiner™, BoundsChecker™, CARS™, CCI™, DataConnect™, DevPartner™, DevPartnerDB™, DevPartner Fault Simulator™, DevPartner SecurityChecker™,Dialog System™, Driver:Studio™, Enterprise Server™, Enterprise View™, EuroSmart™, FixPack™, LEVEL II COBOL™, License Server™, Mainframe Access™, Mainframe Manager™, Micro Focus COBOL™, Micro Focus Studio™, Micro Focus Server™, Object COBOL™, OpenESQL™, Optimal Trace™,Personal COBOL™, Professional COBOL™, QACenter™, QADirector™, QALoad™, QARun™, Quality Maturity Model™, Server Express™, SmartFind™, SmartFind Plus™, SmartFix™, SoftICE™, SourceConnect™, SupportLine™, TestPartner™, Toolbox™, TrackRecord™, WebCheck™, WebSync™, and Xilerator™ are trademarks of Micro Focus (IP) Ltd. All other trademarks are the property of their respective owners. No part of this publication, with the exception of the software product user documentation contained on a CD-ROM, may be copied, photocopied, reproduced, transmitted, transcribed, or reduced to any electronic medium or machine-readable form without prior written consent of Micro Focus (IP) Ltd.
    [Show full text]
  • Design and Implementation of an Optionally-Typed Functional Programming Language
    Design and Implementation of an Optionally-Typed Functional Programming Language Shaobai Li Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2017-215 http://www2.eecs.berkeley.edu/Pubs/TechRpts/2017/EECS-2017-215.html December 14, 2017 Copyright © 2017, by the author(s). All rights reserved. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Design and Implementation of an Optionally-Typed Functional Programming Language by Patrick S. Li A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Engineering { Electrical Engineering and Computer Sciences in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Koushik Sen, Chair Adjunct Professor Jonathan Bachrach Professor George Necula Professor Sara McMains Fall 2017 Design and Implementation of an Optionally-Typed Functional Programming Language Copyright 2017 by Patrick S. Li 1 Abstract Design and Implementation of an Optionally-Typed Functional Programming Language by Patrick S. Li Doctor of Philosophy in Engineering { Electrical Engineering and Computer Sciences University of California, Berkeley Professor Koushik Sen, Chair This thesis describes the motivation, design, and implementation of L.B. Stanza, an optionally- typed functional programming language aimed at helping programmers tackle the complexity of architecting large programs and increasing their productivity across the entire software development life cycle.
    [Show full text]
  • Extensions of JADE and JXTA for Implementing a Distributed System
    EXTENSIONS OF JADE AND JXTA FOR IMPLEMENTING A DISTRIBUTED SYSTEM Edward Kuan-Hua Chen A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE School of Engineering Science O Edward Kuan-Hua Chen 2005 SIMON FRASER UNIVERSITY Spring 2005 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. APPROVAL Edward Kuan-Hua Chen Master of Applied Science Extensions of JADE and JXTA for Implementing a Distributed System EXAMINING COMMITTEE Chair: John Jones Professor, School of Engineering Science William A. Gruver Academic Supervisor Professor, School of Engineering Science Dorian Sabaz Technical Supervisor Chief Technology Officer Intelligent Robotics Corporation Shaohong Wu External Examiner National Research Council Date Approved: April 8, 2004 SIMON FRASER UNIVERSITY PARTIAL COPYRIGHT LICENCE The author, whose copyright is declared on the title page of this work, has granted to Simon Fraser University the right to lend this thesis, project or extended essay to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. The author has further granted permission to Simon Fraser University to keep or make a digital copy for use in its circulating collection. The author has further agreed that permission for multiple copying of this work for scholarly purposes may be granted by either the author or the Dean of Graduate Studies.
    [Show full text]
  • Peer-To-Peer Virtualized Services
    International Journal on Advances in Internet Technology, vol 4 no 3 & 4, year 2011, http://www.iariajournals.org/internet_technology/ 89 Peer-to-Peer Virtualized Services David Bailey and Kevin Vella University of Malta Msida, Malta Email: [email protected], [email protected] Abstract—This paper describes the design and operation advance a rethink of general purpose operating system of a peer-to-peer framework for providing, locating and architecture. consuming distributed services that are encapsulated within The performance hit commonly associated with virtual- virtual machines. We believe that the decentralized nature of peer-to-peer networks acting in tandem with techniques such ization has been partly addressed on commodity computers as live virtual machine migration and replication facilitate by recent modifications to the x86 architecture [3], with both scalable and on-demand provision of services. Furthermore, AMD and Intel announcing specifications for integrating the use of virtual machines eases the deployment of a wide IOMMUs (Input/Output Memory Management Units) with range of legacy systems that may subsequently be exposed upcoming architectures. While this largely resolves the issue through the framework. To illustrate the feasibility of running distributed services within virtual machines, several computa- of computational slow-down and simplifies hypervisor de- tional benchmarks are executed on a compute cluster running sign, virtualized I/O performance will remain mostly below our framework, and their performance characteristics are par until I/O devices are capable of holding direct and evaluated. While I/O-intensive benchmarks suffer a penalty concurrent conversations with several virtual machines on due to virtualization-related limitations in the prevailing I/O the same host.
    [Show full text]
  • A Model of Inheritance for Declarative Visual Programming Languages
    An Abstract Of The Dissertation Of Rebecca Djang for the degree of Doctor of Philosophy in Computer Science presented on December 17, 1998. Title: Similarity Inheritance: A Model of Inheritance for Declarative Visual Programming Languages. Abstract approved: Margaret M. Burnett Declarative visual programming languages (VPLs), including spreadsheets, make up a large portion of both research and commercial VPLs. Spreadsheets in particular enjoy a wide audience, including end users. Unfortunately, spreadsheets and most other declarative VPLs still suffer from some of the problems that have been solved in other languages, such as ad-hoc (cut-and-paste) reuse of code which has been remedied in object-oriented languages, for example, through the code-reuse mechanism of inheritance. We believe spreadsheets and other declarative VPLs can benefit from the addition of an inheritance-like mechanism for fine-grained code reuse. This dissertation first examines the opportunities for supporting reuse inherent in declarative VPLs, and then introduces similarity inheritance and describes a prototype of this model in the research spreadsheet language Forms/3. Similarity inheritance is very flexible, allowing multiple granularities of code sharing and even mutual inheritance; it includes explicit representations of inherited code and all sharing relationships, and it subsumes the current spreadsheet mechanisms for formula propagation, providing a gradual migration from simple formula reuse to more sophisticated uses of inheritance among objects. Since the inheritance model separates inheritance from types, we investigate what notion of types is appropriate to support reuse of functions on different types (operation polymorphism). Because it is important to us that immediate feedback, which is characteristic of many VPLs, be preserved, including feedback with respect to type errors, we introduce a model of types suitable for static type inference in the presence of operation polymorphism with similarity inheritance.
    [Show full text]
  • An Overview of the Usage of Default Passwords (Extended Version)
    An Overview of the Usage of Default Passwords (extended version) Brandon Knieriem, Xiaolu Zhang, Philip Levine, Frank Breitinger, and Ibrahim Baggili Cyber Forensics Research and Education Group (UNHcFREG) Tagliatela College of Engineering University of New Haven, West Haven CT, 06516, United States fbknie1, [email protected],fXZhang, FBreitinger, [email protected] Summary. The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem in 2017. In this study we investigated several common applications and their pass- word policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). In order to understand the developer decision to implement default passwords, we raised this question on many online platforms or contacted professionals. Default passwords are still a significant problem. 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 char- acter. Key words: Default passwords, applications, usage, security 1 Introduction Security is often disregarded or perceived as optional to the average consumer which can be a drawback. For instance, in October 2016 a large section of the In- ternet came under attack. This attack was perpetuated by approximately 100,000 Internet of Things (IoT) appliances, refrigerators, and microwaves which were compromised and formed the Mirai botnet. Targets of this attack included Twit- ter, reddit and The New York Times all of which shut down for hours.
    [Show full text]