Wednesday, December 20, 2006
Two wise men on MS, Yahoo and Google
BJ: they seem to have married with "msn msgr" ...if you mean it is LCS...then yes
pkbehera: well MSN is LCS
BJ: I believe LCS is lot more than MSN messenger
BJ: messenger is a front end to LCS
pkbehera: perhaps they have opened up some web services like stuff on LCS for YM to talk to
BJ: IMHO lcs is a middleware + backend
BJ: perfect
pkbehera: right
BJ: btw web services are "default" mechanism for IPC in .NET
pkbehera: well yahoo tried best to enter enterprised and did not have much success, so LCS is one route of getting into enterprises for them
BJ: possible...
BJ: the main magnet for both MS and Yahoo is the following
BJ: 1. Large existing user base for yim
BJ: 2. large existing users for msn IM
BJ: take union of 1+2 ...and get even 10% to click on the ad links...a potential million $ mkt for them
BJ: and many orgs already using yim unofficially for their multi-site collaboration
BJ: now both yahoo + ms want to exploit that potential too
BJ: btw...did u notice unprovoked apperance of ads in latest YIM tool?
pkbehera: yes
pkbehera: thats irritating
BJ: yeah...call it "ad sense" in yim
pkbehera: and keeps shouting at me "u fool, swith to ggle talk"
pkbehera:
BJ: yeah...but all ur peers too need to move to ggle talk then...i see that happening very slowly
pkbehera: which much less lightweight, less fancy
BJ: these IMs are a sticky tool...my father and your father if they are used to yahoo...will not switch to ggle talk easily
pkbehera: thankfully that adsense is limited to the main ym window
BJ: next version will be those popping on and off as u type
pkbehera: yes
BJ: i have a feeling that ggle wants to come out with a whole suite of tools for "collaboration on the web" and go to big enterprises and reduce their bills on MS Office licenses ...
pkbehera: yeah thats their plan
pkbehera: ggle docs is already very impressive
pkbehera: there is few other such players too
BJ: and all these nuts and bolts like gmail, talk, picasa, calendar etc...are pre launch feelers to get the mind share of peple on the web
pkbehera: yes
BJ: yeah...ggle is acquiring small players in the arena ...
pkbehera: with gmail they introduced a whole new concept of conversations, rather than messages and folders
pkbehera: thats getting hugely popular
pkbehera: www.thinkfree.com, seen this?
pkbehera: and www.zoho.com
pkbehera: they give a little more than ggle docs as of now,
pkbehera: MS office has got serious competition
BJ: yeah...billy has already set his best drivers to steer them home with "windows live" adventure
Thursday, November 23, 2006
Tuesday, November 21, 2006
C# class for Hex encoding
#region HexUtil class
/// <summary>
/// Utility class for doing Hex encoding/decoding
/// </summary>
public sealed class HexUtil {
/// <summary>
/// Holds the hex characters for a fast lookup
/// </summary>
private static readonly char[] HEX_CHARS = "0123456789ABCDEF".ToCharArray();
//Keep the array sorted for faster search
static HexUtil() {
Array.Sort(HEX_CHARS);
}
/// <summary>
/// No explicit client creation needed/allowed
/// </summary>
private HexUtil() {
}
/// <summary>
/// Creates a byte array from the hexadecimal string. Each two characters are combined
/// to create one byte. First two hexadecimal characters become first byte in returned array.
/// If input hex string contains an odd number of bytes, then last character is dropped to
/// make the returned byte array as even bytes. It raises ArgumentException, if a
/// Non-hexadecimal character is encountered while processing the string.
/// </summary>
/// <param name="hexString">String to convert to byte array. It should contain only
/// Hex chars [0-9 a-f A-F] only, else error will be raised. See description above </param>
/// <returns>byte array, in the same left-to-right order as the hexString</returns>
///
public static byte[] GetBytes(string hexString) {
if( ! IsValidHexCharLength(hexString) ) {
throw new ArgumentException("Invalid hexString size");
}
//check for non hex characters
StringBuilder tempString = new StringBuilder(hexString.Length);
foreach (char c in hexString) {
if (IsHexChar(c)) {
tempString.Append(c);
}
else {
throw new ArgumentException("Non Hexadecimal character '"+c+"' in hexString");
}
}
string verifiedHexString = tempString.ToString();
tempString=null;
//check for valid length. If number of characters is odd in the hex string then
//drop the last character
if ((verifiedHexString.Length % 2) != 0) {
verifiedHexString = verifiedHexString.Substring(0, verifiedHexString.Length-1);
}
//Convert each hex character to byte
//Hex byte length is half of actual ascii byte length
int byteArrayLength = verifiedHexString.Length / 2;
byte[] hexbytes = new byte[byteArrayLength];
string tmp_substring = null;
try {
for (int i = 0; i < hexbytes.Length; i++) {
int charIndex = i * 2;
tmp_substring = verifiedHexString.Substring(charIndex, 2);
hexbytes[i] = Convert.ToByte(tmp_substring, 16);
}
}
catch (FormatException ex) {
throw new ArgumentException("hexString must be a valid hexadecimal", ex);
}
return hexbytes;
}
/// <summary>
/// Converts the input bytes array to a String assuming each character as a hexadecimal
/// character. Uses .NET Byte.ToString("X2") implementation to achieve the encoding
/// </summary>
/// <param name="bytes">hex encoded bytes to be converted to the string</param>
/// <returns>A string representation of the input bytes assuming Hex encoding</returns>
public static string ToString(byte[] bytes) {
if( bytes == null || bytes.Length == 0) {
throw new ArgumentNullException("bytes");
}
StringBuilder hexString = new StringBuilder();
foreach (byte byt in bytes) {
hexString.Append( byt.ToString("X2") );
}
return hexString.ToString();
}
/// <summary>
/// Determines if given string is in proper hexadecimal string format
/// </summary>
/// <param name="hexString">string to be tested for valid hexadecimal content</param>
/// <returns>true if hexString contains only hex characters and
/// atleast two characters long else false.</returns>
public static bool IsHexString(string hexString) {
bool hexFormat = IsValidHexCharLength(hexString);
if(hexFormat) {
foreach (char ch in hexString) {
if (!IsHexChar(ch)) {
hexFormat = false;
break;
}
}
}
return hexFormat;
}
/// <summary>
/// Checks to see if the input string is not null and atleast two
/// characters long
/// </summary>
/// <param name="hexString">string to be tested</param>
/// <returns>true if hexString is not null and atleast two
/// characters long</returns>
private static bool IsValidHexCharLength(string hexString) {
return ((hexString != null) && (hexString.Length >= 2));
}
/// <summary>
/// Returns true if c is a hexadecimal character [A-F, a-f, 0-9]
/// </summary>
/// <param name="c">Character to test</param>
/// <returns>true if c is a hex char, false if not</returns>
public static bool IsHexChar(Char c) {
c = Char.ToUpper(c);
//look-up the char in HEX_CHARS Array
bool isHexChar = (Array.BinarySearch(HEX_CHARS,c) >= 0);
return isHexChar;
}
/// <summary>
/// This is a utility method to convert any input byte[] to the requiredSize. If the input
/// byte[] is smaller than requiredSize, then a new byte array is created where all lower order
/// places are filled with input byte[] and balance places are filled with 0 (zeros). inputBytes
/// array is truncated if it is larger than requiredSize.
/// </summary>
/// <param name="inputBytes">input byte aray</param>
/// <param name="requiredSize">the size of the byte array to be created</param>
/// <returns>a byte array of requiredSize</returns>
public static byte[] CreateLegalByteArray(byte[] inputBytes, int requiredSize) {
byte[] newBytes = null;
int inputLength = inputBytes.Length;
if(inputLength == requiredSize) {
//nothing to do
newBytes = inputBytes;
}
else {
//create a new Byte array of reuired lenght and fill the content with
//given byte[] starting from 0 index in the new byte[]
newBytes = new byte[requiredSize];
int len= newBytes.Length;
if (len > inputLength) {
len= inputLength;
}
Array.Copy(inputBytes,newBytes,len); //note: balance is filled with 0 (zero)
}
return newBytes;
}
}
#endregion
Monday, November 20, 2006
Friday, November 17, 2006
Sight...
Tuesday, November 14, 2006
Recipe for inter-operating a C# Symmetric Encryption code with OpenSSL
Interoperability is not a difficult thing to achieve. Yet, it is not an easy thing to get either- predominantly because the relevant information are widely fragmented and even Google fails to compact all of them together- leaving you rummaging through a pile of web pages to fish out really useful information from them. I am posting this for my own help- may be in future I will need to come back here to look at this again to see what I did!
I needed to write some C# code which will take in a plain text file and run some Symmetric Encryption routine over them using a given Initialization Vector (IV) and a Secret Key (SK). The output will be some encrypted binary data which should be decoded by the OpenSSL tool. Basically, I wanted following OpenSSL command line to work for me always:
$openssl enc [-aes-128-cbc] -in <CipherData.bin> -out <ClearData.txt> -d -K <SomeSecretKey> -iv <SomeIV>
Here <CipherData.bin>
With -–K (and -iv) option, OpenSSL expects only Hexadecimal secret key (and IV) string whose valid size differ for different algorithms employed. The input hex string is converted into a byte array and used as SK (and IV). The interesting part is that OpenSSL and .NET crypto behave differently if you do not supply a valid length hex stream against these data. While, OpenSSL intelligently (and silently) pads the byte array with trailing 0s to make up for the shortfall in “legal” size or truncate it if the same goes beyond the adequate size, the C#/.NET crypto code dies with an exception, leaving you puzzled- what went wrong? Sometimes, to baffle us more, a secret key which had worked in C#/.Net seems to give you "“bad crypto"” in OpenSSL and vice versa.
The crux is how you encode (and decode) a Hex string into byte[] for SK and IV. Basically the point to remember is that a simple Hex text like "“CAFEBABE"” is 8 ASCII character (8 bytes array) but, becomes 4 bytes array when converted to Hex encoding. I have a sample HexUtil C# class which illustrates these things... wait for next post.
Problem # 2: Line breaks in base64 encoding
$openssl enc -a -A -d -in <B64EncryptedData.txt> -out <B64EncryptedData.txt.out>
Thursday, October 26, 2006
Tuesday, September 19, 2006
Wednesday, July 26, 2006
Getting rid of Null Pointers
Yesterday stayed awake till late in the night. I was trying to book a ticket at a well-known website and this is what I encountered on the screen:
java.lang.NullPointerException: null at org.apache.struts.taglib.template.InsertTag.doEndTag(InsertTag.java:133)
at booking._0002fbooking_0002fbookTicket_0002ejspbookTicket_jsp_
1._jspService
(_0002fbooking_0002fbookTicket_0002ejspbookTicket_jsp_1.java:485) at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:126) at
javax.servlet.http.HttpServlet.service(HttpServlet.java:853) at org.apache.jasper.runtime.JspServlet$JspServletWrapper.service(JspServlet.
java:174) at org.apache.jasper.runtime.JspServlet.serviceJspFile(JspServlet.java:268)
at org.apache.jasper.runtime.JspServlet.service(JspServlet.java:381) at
javax.servlet.http.HttpServlet.service(HttpServlet.java:853) at com.broadvision.servlet.ServletContainer.service(ServletContainer.java:404
) at com.broadvision.servlet.BVRequestDispatcher.forward(BVRequestDispatcher.ja
va:133) at …
While, clearly above is a testimony to a poor QA activity, but, the responsibility of the coder is no less severe either. Actually, it perhaps mirrors a poor coding practice followed by him/her which went unnoticed throughout the entire SDLC.
There is very little that a language compiler can do to check and alert the coder if he/she is leaving a dangling reference attached to 'nothing' before the code actually runs and the OS detects that the program has tried to reach a location that is either out of bounds for the current code or it is not present in the universe (mem address space) at all. Therefore, all null pointers show up only at the first usage of a handle (reference or pointer) that points to a NULL location.
If surfacing unsolicited was not enough, such ‘runtime’ exceptions generally carry useless information along to be of any help during debugging, unless the coder has implemented a meticulous audit/tracing plan. Try to decipher what went wrong in the above exception message? Here the coder at least was fortunate to have a dorky build engineer who allowed to ship the software with debug information on (look at those source code line numbers) otherwise, stack trace would have been dumber with no evidence of what went wrong and where… I mean you would not find any line numbers and if the code was subjected to massive compiler optimization then it would loose every bit of its identity due to the mangling of information and sometimes further obfuscated by dynamic compilation by JITC.
So, as they say, prevention is the best cure. Do not write code that can suffer from such an ailment and writing code as given below is suicidal. In the following example I am trying to fetch some ‘textual’ information from a Database (DB).
String txtData = getCollectionFromDB().getSomeDataForNamedKey().getValue().trim()
This looks smart (?) But, IMHO usages like this is the single biggest source of null pointers and other hypodermic bugs.
Yes, in our DB, values can be "NULL" or there may not be a matching row to fetch. Practice of in lining many calls as above is a great source of null pointer exception especially, if the data is coming from outside your code 'boundary'. Here you have absolutely no control over what is coming to you. In the above snippet, all the method calls preceding the dot (.) operator could give you a null reference leading to the exception. E.g. trim() would fail on a null value returned by getValue(); getValue() would fail on a null Object fetched by getSomeDataForNamedKey() and so on.
Why would you write code like this? This programming practice does not save anything except may be some of your typing time and finger ache! Instead of being stingy on words and lines as above, try to break calls into individual ‘statement’ and combine such statements into a code block (example shown below). This not only yields a more robust code but, also makes code easier to comprehend. Whats more, the debugger tools will also report proper line numbers happily.
Map nameValuePairMap = getCollectionFromDB();
if( isNull(nameValuePairMap) )
{
//do Blah Blah
}
else
{
NameValuePair someNameValue = nameValuePairMap.GetSomeDataForKey();
// Do Null check
...
String dataValue = someNameValue.GetValue();
if( isNull(dataValue) )
{
txtData ="";
}
else
{
txtData = dataValue.trim();
}
...
}
Follow this and & > 80% of your programming bugs (especially Null pointers) would disappear.
Ask me how do I know that :-)
Saturday, July 08, 2006
Saturday, June 17, 2006
Wednesday, June 14, 2006
Abstraction and Encapsulation
<<S. RamaLinga Reddy>>The first page is normally crammed with such accomplishments and aspirations. One Reddy I saw had included this too “H/W: Pentium-III, 633MHz, 128 MB RAM, 8.3 GB SCSI- II HDD, 32x CDROM, 1.44 (3.5 in) FDD, PCI BUS Architecture”. Next tens of pages lists the projects he has worked like: “Web Based Employee Attendance Management System”, “Employee Data Management System”, “Ticket Reservation Systems” and so on.
Hyderabad
BCA, MCA, PGDST, e-DAST, NSCT,NIIT…(yes IT qualifications in India look like degrees of a medical practitioner- the more the better)
5+ years in IT
Expert in C#/.NET, ASP.Net, VB.Net,C, C++, Java,
Knowledge of COM, DCOM, COM+, MTS, SQL Server, IIS, Windows, Unix (?), OOP, Design Patterns…
Responsible for FSD, LLD, HLD, CUT…
Wannabe S/W Architect
Yesterday, I interviewed one such candidate. As expected, he too had a well endowed resume not different from the above sample, though. I am reticent even during interviews. Hence, he was quizzed mostly by my colleague. I just had one question at the end:
What is the difference between Abstraction and Encapsulation?End of interview!
Answer: Both are actually same…umm...like Encapsulation...is Encapsulating things in a class and...umm ... Abstraction is Abstracting somethings inside a class...umm...blah blah blah
I have been asking this question to every 5+ years I see. However, rarely I get a pleasing answer. No wonder we still remain a land of ‘Cyber Coolies’!
For the benefit of next candidate I have to interview, here are some links to look at:
http://www.itmweb.com/essay550.htm
http://www.javaworld.com/javaworld/jw-05-2001/jw-0518-encapsulation.html
http://www.artima.com/intv/abstreffi.html
http://forum.java.sun.com/thread.jspa?threadID=280797&messageID=1092364
It is important to learn how to abstract what you know and encapsulate what you don't before you appear for a job interview !
:-)
Thursday, May 11, 2006
Tuesday, May 02, 2006
Thursday, April 13, 2006
Wow - What a Ride!
with the intention of arriving safely
in an attractive and well preserved body,
but rather to skid in broadways,
Haywards in one hand - Goldflake in the other,
body thoroughly used up, totally worn out, and screaming
Monday, March 27, 2006
On Sale
Done ~48000 kms
Single handedly driven,
Excellent condition, Looks much younger,
Fed on Speed, Premium and Power
New battery,
New front tyre,
Semi-new rear tyre (done 20,000 kms)
Comprehensive insurance paid upto Feb, 2007
PUC valid up to august, 2006
Expected price 16,000/- (negotiable)
Reason for sale: going for a Royal Enfield Bullet
Contact: hi2bj AT sify DOT com
She has served me very well for the past eight years…now is the time to bid her adieu :-(
Wednesday, March 15, 2006
Wednesday, March 08, 2006
What's new?
Thursday, March 02, 2006
Loosing patience!
Anyone (other than me) stuck at the same damn status?
:-(
Friday, February 24, 2006
Kabhi Socha Thaa?
Thursday, February 02, 2006
Trip to Ganpatipule
Three days of delectable indolence passed like a trice and now back to the stock humdrum of urban life!
More pics from the trip.
Tuesday, January 31, 2006
Patience Pays
"Police Report is clear and the passport is expected to be despatched by 18-02-2006 Subject to all documents being in order."I have not paid any bribe to get it cleared. Which makes me believe that our government agencies can really work. What you need is an 'honest' patience to wait (I have waited for over ten weeks now) for the results to happen naturally. Most often it is only us, who try to catalyze the process by greasing with bribes, in order to 'accelerate' results.
Hope my trust in the system is not betrayed.
Saturday, January 28, 2006
Time
"...And you run and you run to catch up with the sun, but it's
sinking
And racing around to come up behind you again
The sun is the
same in the relative way, but you're older..."
Sunset at Ganpatipule near Ratnagiri, Konkan Coast
College mates
Tuesday, January 24, 2006
Invited to talk
About two hundred odd under graduate students of computer science had gathered in an auditorium to listen us. I spoke about genesis and uniqueness of Java and what makes it so popular. I had also compiled some interesting real world applications to demonstrate that Java can be used everywhere, right from e-Commerce, home networking, gadgets to space exploration. I could feel, most present there knew that java is limited to ubiquitous internet applications and shopping carts only. They were wide eyed after hearing how java powers Philips iPronoto and BMW in-dash infotainment or how Mars exploration was simulated using Java 3D imaging. Prasanta went deep and spoke about complex issues in enterprise applications like dealing with heterogeneous database, bridging isolated and disparate applications and how J2EE addresses such challenges.
This was my second such presentation. Earlier I had been to Wadia College. It is a always a great experience talking in front of such an audience and more so speaking about Java :-).
Hope, I could educate them about power and applications of Java and cleared some of their doubts...
Wednesday, January 11, 2006
Hats Off to The Metro Man
Tuesday, January 10, 2006
Thursday, January 05, 2006
What lies ahead
Check out Microsoft's vision of the future.
A peek into futuristic computing; slightly dated, still worth a dekko
IBM's Autonomic Computing
Google's ten golden rules to get the best out of knowledge workers in order to be a successful business in the next quarter century.
An excellent pictorial summary by Don Paragon about evolution of mankind and man made society.
Sun's vision of the future of programming- a nice compilation and commentary on how programming might look like in future!
Let me be honest; I am still biased towards Java :-). Here is a link, that has Q&A type information on future of Java.
Look at Future Web Technology. Don't sulk and hide your face if you find it Greek and Latin! Here is a more palatable version from W3C.
IRCTC starts Tatkal booking
Way to go, IR!
Wednesday, January 04, 2006
Programmer's Bookshelf
- UML Distilled- Martin Fowler et al
- Thinking in Java- Bruce Eckel
- Core J2EE Patterns...- Deepak Alur et al, Sun Microsystems
- Expert One-on-One J2EE Design and Development- Rod Johnson
- Core Java Vol-I and II - C Horstmann et al, Sun Microsystems
- Data Structures and Algorithms in Java -Robert Lafore et al
- Inside The Java Virtual Machine - Bill Venners
- Mastering Enterprise Java Beans- Ed Roman et al
- C# for Java Developers- Allen Jones et al, Microsoft Press
- Inside COM- Dale Rogerson, Microsoft Press
- Design of UNIX Operating System- Maurice J. Bach
Tuesday, January 03, 2006
Just back from a Training
- Using UML to model static and dynamic aspects of a system
- Class and Object identification and their inter-relationship
- Realizing Use Cases of a System
- Migrating from Analysis to Design of a System
- Encapsulate what might change
- Design by Contract
- Liskov Substitution Principle
- Open Close Principle
- Class with Single Responsibility
- Favour Composition over Inheritance
- Program to Interface than Implementation
- Dependency Inversion
What a great way to shutdown 2005 and boot into 2006!