Kapsel Binus Meeting 3 - Bluemix (06/10/2014)
Guest Lecturer
Meeting 3
Build Your Dream Apps
IBM Bluemix
Meirissa Farah Fhonna
Cloud computing: the word cloud (also phrased as "the cloud") is used as a metaphor for "the Internet," so the phrase cloud computing means "a type of Internet-based computing," where different services — such as servers, storage and applications — are delivered to an organization's computers and devices through the Internet.
Cloud computing is is typically defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.
Cloud service model:
  1. Traditional On-PremisesClient manage : Application, Data, Runtime, Middleware, O/S, Virtualization, Servers, Storage, Networking
  2.  Infrastructure as a serviceClient manage   : Application, Data, Runtime, Middleware, O/SVendor manage: Virtualization, Servers, Storage, Networking
  3. Platform as a serviceClient manage   : Application, Data Vendor manage: Runtime, Middleware, O/S, Virtualization, Servers, Storage, Networking
  4. Software as a serviceVendor manage: Application, Data, Runtime, Middleware, O/S, Virtualization, Servers, Storage, Networking

Benefits
Time Commitment
Core IT
Fully customizable
Few limitation
Necessary for some solutions
Existing investment
Weeks to setup and deploy
Maintenance/upgrades of hardware and software
Infrastructure as a Service (IaaS)
Most control in the cloud
Necessary for some solutions
Infrastructure managed by SP
Minutes to provision VM
Time to configure software and apps varies
Maintenance/upgrades of OS, middleware, runtime
Platform as a Service (PaaS)
Setup environments and deploy apps very quickly
Infrastructure and platform managed by SP
Minutes to setup and deploy
Focus on your apps and the data


               
What is Bluemix ?
Bluemix is an open-standards, cloud-based platform for building, managing, and running apps of all types, such as web, mobile, big data, and smart devices. Capabilities include Java, mobile back-end development, and application monitoring, as well as features from ecosystem partners and open source—all provided as-a-service in the cloud.

Why are developers using Bluemix ?
  • To rapidly bring products and services to market at lower cost
  • Go from zero to running code in a matter of minutes
  • To continuously deliver new functionality to their applications
  • Automate the development and delivery of many applications
  • To extend existing investments in IT infrastructure
  • Extend existing investment by connecting securely to on-premises infrastructure



Kapsel Binus Meeting 2 - Big Data (29/09/2014)
Speaker Profile :
Peter Lake
Sheffield

Big Data : is  a massive volume of both structured and unstructured data(consisting of billions to trillions of records of millions of people) that is so large that it's difficult to process using traditional database and software techniques.

The Forrester definition of Big Data :
Big Data is the frontier of a firm's ability to store, process, and access(SPA) all the data it needs to operate effectively, make decisions, reduce risks and serve customers.

SAP(Systems Applications and Products) :

  1. Rapidly deploy solutions specific to your industry or line of business
  2. Receive instant answers to complex business questions
  3. Capture and store massive volumes of structured and unstructured data
  4. Unlock valuable insight from any data source, even social media sites like Facebook or Twitter
  5. Give your decision makers anywhere, anytime access to powerful analytical tools
4 V's of Big Data :
  1. Volume : The quantity of data that is generated is very important in this context.It is the size of the data which determines the value and potential of the data under consideration and whether it can actually be considered as Big Data or not.The name ‘Big Data’ itself contains a term which is related to size and hence the characteristic. 
  2. Velocity :The term ‘velocity’ in the context refers to the speed of generation of data or how fast the data is generated and processed to meet the demands and the challenges which lie ahead in the path of growth and development.
  3. Variety : The next aspect of Big Data is its variety.This means that the category to which Big Data belongs to is also a very essential fact that needs to be known by the data analysts.This helps the people, who are closely analyzing the data and are associated with it, to effectively use the data to their advantage and thus upholding the importance of the Big Data.
  4. Veracity : This refers to the uncertainty of the data available to marketers. This may also be applied to the variability of data streaming that can be inconsistent, making it harder for organizations to react quickly and more appropriately. Generally, big data veracity has an impact on the confidence reposed by the marketer to their database. However, in a volatile big data environment, accuracy becomes an issue among digital marketers regarding the collected data for their business.
Who benefits from Big Data ?
Big data is big business. The IT research firm Gartner estimates that total software, social media, and IT services spending related to big data and analytics topped $28 billion worldwide in 2012. All estimates predict rapid growth. In addition to vendors, at least three types of organizations are harvesting value from big data.

  1. Companies with a tradition of fact-based decision making. Procter & Gamble and UPS are exemplars. In the 1920s P&G became the first company to make significant product and advertising decisions on the basis of detailed market research data laboriously gathered during door-to-door conversations with consumers. Today P&G uses computer modeling and simulation to analyze multiple data sources—comments collected from social media, consumer sales data, RFID data, and information from the company’s highly digitized processes—and makes fact-based decisions on a daily basis.
    UPS started tracking the movements of its vehicles and packages in the 1980s. More recently, the company began using big data from telematics sensors installed in its vehicles together with mapping data and other real-time reports of drop-offs and pickups from its drivers. Using these data, UPS designs routes that, for example, minimize the number of left turns a driver must make to deliver a load. Such changes can generate big payoffs, because they are deployed with more than 100,000 drivers around the world. In 2011, guided by analysis of big data, UPS avoided adding more than 11,000 metric tons of CO2 to the atmosphere and saved $30 million in fuel costs.
  2. Engineering and research functions. Many engineering-based companies rely on analysis of big data to make critical operating decisions. For example, as long ago as the 1960s ExxonMobil invented 3-D seismic technology, which revolutionized how the oil and gas industry decided where to drill. Collecting and processing 3-D images of geologic formations beneath the earth’s surface provided more and better data for those decisions. Today the company’s scientists and engineers use 4-D analysis (which shows changes in a field over time) to further reduce the costs and risks of exploration. Researchers at pharmaceutical and biotech companies are also using big data and powerful processing to help drive business decisions.
  3. The best web-native companies. Companies that connect with customers solely via the internet can capture enormous amounts of data about customer behavior. This is the perfect big-data opportunity for making fact-based decisions. One technique, which has become almost a governing ethos for Google, Amazon, Netflix, and eBay, is A/B testing, in which some users are diverted to a slightly different version of a web page, which is presenting a new idea or product. The behavior of those users (B) is then compared with that of users on the existing page (A), and the results are often subjected to sophisticated statistical analysis. This technique transforms much product-development decision making from a subjective to an objective exercise. Product designers are often shocked to learn how bad their instincts and rules of thumb are. In a neat twist, Google and Amazon are now providing tools that will help other companies follow the same approach.
Scaling :
  1. Horizontal Scaling : means that you scale by adding more machines into your pool of resources. It will process the data using multiple servers or spread along different servers.
    Example : The Hadoop
  2. Vertical Scaling : means that you scale by adding more power (CPU, RAM) to your existing machine.
    Example : Oracle
In Big Data case, it is best to use Horizontal Scaling technique so it can perform faster to process the data. If we use Vertical Scaling, it will be slower to process the data.
How to hide and show divs using jquery
I made this div to be hidden at first



To hide this div, do :
$('#accepted').hide();
$('#invitation').hide();
->put this hide command in javascript before the trigger create

$('#accepted').hide();
$('#invitation').hide();
$('div#paralel-scanning-inbox').trigger('create');

then, to show the divs again, put :
$('#invitation').show();
$('#accepted').show();

Result of JSON only containing 1 data
This is the function to check whether if the JSON is array.
i put this function in main.js, so it became global and can be called from any other javascript files

function isArray(obj) {
return Object.prototype.toString.call(obj) === '[object Array]';
}

the return value will be true if the JSON is an Array and it will return false if the json  which is checked is not an array

How to call isArray function from other javascript files :

isArray(response.result.deviceList);

if we give a variable to store the return value :
temp=isArray(response.result.deviceList);
then, temp value will be true or false after isArray function called.
How to Delete/Rename a Stubborn File
There are several reasons why Windows might not allow you to delete a file:
  • The file might be in use in which case you can't delete the file until the program using it gives it up.
  • The file might be marked read-only.
  • The file name might be so long that Windows can't handle it. File names with more than 260 characters in them are often difficult to delete.
There are also several reasons why Windows might not allow you to change the name of a file; particularly its extension. All above apply here; as well as...
  • Your system may not be showing file extensions by default.
We'll cover that one first and the others in turn.

File Extensions Not Showing

This is the most likely possibility for why you might not be able to change a file's type (i.e., rename the file extension). When Windows installs, one of the defaults is to turn off the showing of the full names for common file types. Basically, in Windows Explorer only the file's rootname shows; the extension is suppressed, yet is "shown" via the description in the File Type column of the Windows Explorer display.
When Windows is set up this way, if you attempt to change a file's name you are only allowed to change the rootname of the file but not its extension. So, if you have a file that shows up as MYFILE as file type Text and you attempt to rename the file to MYFILE.DOC what you really have done is rename MYFILE.TXT to MYFILE.DOC.TXT and the file type in Explorer will remain Text instead of changing to a Word File.
How to you fix this? FILExt has a different FAQ here that explains the procedure in detail.

The File is in Use

A file in use by the operating system generally can't be changed while the file is in use. A file in use by a program may or may not be able to be changed. These are not hard and fast rules and exceptions abound; particularly in a multi-user environment. But, if you try to rename or delete a file and Windows complains that the file is in use don't be surprised.
To fix this you have to determine what is using the file. The error message that Windows pops up may or may not have that information in it.
If you don't want to experiment a bit to figure out what might be using the file you can restart the computer with all startup options turned off. This will most likely not run whatever was using the file and the system will allow you to rename the file. Recognize that if you do this and then restart the computer with all startup options enabled some program will likely complain that it can no longer find the file you just renamed. This may or may not affect how your system performs (or even operates at all).
To change the startup options, use the System Configuration Utility.
  • Click on the Start Menu.
  • Click on the Run item.
  • Type msconfig into the dialog box and click OK.
Use the various startup options settings to reconfigure your system startup as needed to find the subject program or process. Remember the caveat about how changing the name of a file a program or the system uses might affect system behavior. Keep good records so you can reverse what you did if necessary.
If you want to experiment a bit, press the Control-Alt-Delete keychord (press all three keys at the same time) only once (if you press the keychord twice you will restart your computer). The Windows Task Manager will appear. Take the Applications tab and see if anything is running. If so, stop those programs (it's usually better to switch to the program and then close it from the program instead of picking Close from the Task Manager). Wait a bit as it sometimes takes Windows a bit of time to release all program assets. Then try to rename or delete the file. If you now can rename or delete the file you know one of the programs was using it (stop only one program at a time if you really, really want to know which one).
If you still can't rename or the file you need to go to the Processes tab. There should be a number of running processes. Two of these are particularly important: Explorer and Systray.Do not end these. The other processes should be able to be stopped. Try stopping those processes you may recognize one at a time. Attempt to rename or delete the file after each has stopped. If you can, then you know what process was using the file. Keep going until only Explorer and Systray are running. If the file is still in use you've got your answer. The most basic processes in the computer are using the file. The same caveat as above applies: the file was in use for a reason and if you rename it or delete it the system may become unstable if you rename the file.

File is Marked Read-only

This is the easy one. To find out if a file is marked read-only right click on the file in Windows Explorer. Select "Properties" from the menu that pops up. At the bottom of the dialog that appears are the attributes for that particular file. See if the Read-only box is checked. If so, you won't be allowed to modify the file. To take the read-only attribute off the file uncheck the box. Again, be aware that if some program requires that file to be read-only and you change that attribute or the file's name you may have system problems. Use caution.
Note: If the file is in use (see above) or you don't have the necessary permissions (i.e., you're not logged in with administrator status) the read-only box may be greyed out and until you correct whichever condition is to blame you will not be able to change the attribute.
How does a file get to be read-only? Most of the time it's by copying the file from a CD. Most CD media, by design, is read-only and often when you copy a file from a CD (or an install program copies the file) a read-only attribute will be given to the file because it was read-only on the CD. This doesn't happen often, but does happen often enough to cause some people problems.

File Name is Too Long

Windows has special problems dealing with extra long path/filenames. If the combination of the path and file names gets close to 255 characters (127 for Windows 95/98/ME) Windows will likely not handle it well if you try to delete or rename it (you can create it but not change it). While there are programs that can handle names that long or longer (e.g., FileBoss) the first thing to try would be to rename some of the folders that lead up to the file itself. Back the directory display up one level and then select and rename the folder the file is in. Try a single letter (obviously, keep a record of what folder you named to what so you can reverse the process!). Then, go back to the file and see if Windows then allows you to rename or delete it. If not, go back yet another folder and rename that one and so forth. At some point you should be able to find a series of reduced-length folder names that allow you to then rename the offending file to a short enough name to allow you to then recreate the original directory tree and still work with the file in question.

Special Programs for Deleting Files/Folders

Sometimes you can't seem to delete a file or folder no matter what you do. In this case there are a few programs that might help you.
If, after all this you still can't rename/delete a file, not certain what else to suggest. Others have this problem often and as different ideas might come up in the FILExt forum I'll change this FAQ to include them. If you find a method that works for you and is not in this FAQ, please drop FILExt a note with details on that method so it can be added to the FAQ.
source :
http://filext.com/faq/delete_or_rename_stubborn_file.php
Ways how to delete files
Normally we use delete button or right click the files then click delete or using shit+click to permanently delete the files. But some files cannot be deleted using that kind of ways and we have to find another ways to delete that files. Here are some ways to delete specified files by forcing the windows.

1. Force delete using Windows

Open command prompt from the program files or open it using run(Start-> Run-> Cmd) and enter the commands:

Syntax

del [Drive:][PathFileName [ ...] [/p] [/f] [/s] [/q] [/a[:attributes]]
erase [Drive:][PathFileName [ ...] [/p] [/f] [/s] [/q] [/a[:attributes]]

Parameters

[Drive:][PathFileName Specifies the location and name of the file or set of files you want to delete. Filename is required. You can use multiple file names. Separate file names with spaces, commas, or semicolons.
/p Prompts you for confirmation before deleting the specified file.
/f Forces deletion of read-only files.
/s Deletes specified files from the current directory and all subdirectories. Displays the names of the files as they are being deleted.
/q Specifies quiet mode. You are not prompted for delete confirmation.
/a Deletes files based on specified attributes.
attributes Specifies any of the following file attributes:
AttributeDescription
r
Read-only
a
Archive
s
System
h
Hidden
-
Prefix meaning "not"
/? Displays help at the command prompt.

Remarks

Using /p
If you use /pdel displays the name of a file and sends the following message:
filename, Delete (Y/N)?
Press Y to confirm the deletion, N to cancel the deletion and display the next file name (if you specified a group of files), or CTRL+C to stop the del command.
Disabling command extensions
If you disable command extensions, the /s command-line option displays the names of any files that were not found, instead of displaying the names of files that are being deleted (that is, the behavior is reversed). For more information about disabling command extensions, see cmd in Related Topics.
Deleting more than one file at a time
You can delete all of the files in a folder by typing del followed by [Drive:]Path. For example, the following command deletes all files in the \Work folder:
del \work
You can also use wildcards (that is, * and ?) to delete more than one file at a time. However, you should use wildcards cautiously with the del command to avoid deleting files unintentionally. For example, if you type the following command:
del *.*
The del command displays the following prompt:
All files in directory will be deleted! Are you sure (Y/N)?
Press Y and then ENTER to delete all files in the current folder, or press N and then ENTER to cancel the deletion.
Before you use wildcards with the del command to delete a group of files, you can use the same wildcards with the dir command to see a list of the names of all the files included in the group.
 Warning
After you delete a file from your disk using del, you cannot retrieve it.
The del command, with different parameters, is available from the Recovery Console.

Examples

To delete all the files in a folder named Test on drive C:\, type any of the following:
del c:\test
del c:\test\*.*

2. Use Unlocker

Unlocker is a free program that simplifies the deletion of locked files. It adds a context menu item to Internet Explorer, and can be activated by right-click. It also allows the user to rename or move a locked file.
source :
http://www.sitepoint.com/web-foundations/force-windows-delete-file/
https://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/del.mspx?mfr=true
How to Test Network and Internet Latency (Lag) in Microsoft Windows

Steps

  1. 1
    Go to Start > Run and type cmd. You can also search for cmd.exe in the Windows Search function.

    DataCenter Cloud Computer

     Servers Workstations Motherboards w/ Intel® Xeon® Processor E5 Series
    Supermicro.com.tw/NetworkStorageHPC
  2. 2
    Press OK to launch Windows Command. This is the default command-line interface for Windows.

  3. 3
    Test the loop-back address.
    • Type ping 127.0.0.1 (it is the same for every computer, so you do not need to change this). This will test your computer's network chip, not your modem, router, or Internet connection.

    • Press Enter to begin pinging.

    • Place -t at the end of the command to perform continuous testing.

    • To exit continuous testing, press Ctrl+C.

    • Place -n 20 at the end of the command to send 20 pings. Replace the number 20 with any value (the value will be limited to a 32-bit or 64-bit integer).

    • If everything is correct, you will see something like:

    • Look at the ping statistics. They should report a 0% loss.

    • Keep an eye on the response time, as it represents the connection's latency between you and the server. Double digit values (such as 50ms, or lower) are very good. This varies drastically depending upon where the server is in relation to your computer. Generally, most connections should have latency less than a few hundred milliseconds. If there is no network connection, you will see the output "Request timed out" repeated.

  4. 4
    Test your local gateway. Find your default gateway's IP address:

    • Type ipconfig in the command prompt window.

    • Press Enter. The command prompt will then display the output from the ipconfig command.
    • Find the listing for "Default Gateway". This is the IP you can use in a ping to test the connection between your computer and your router or ISP.
  5. 5
    Test beyond your local network. Test the connectivity of your modem, router, network, or internet connection by using an IP address on the Internet.
  6. 6
    Check domain name resolution. Instead of an IP address, type in a site's domain name, such as www.google.com. Pinging a domain name tests your computer and network's ability to resolve network names (translating them to IP addresses).

  7. 7
    Measure network and internet performance (Windows NT, 2000, XP, and Vista only). Use the tracert command to measure the response of each hop in a network path. Your connection to any one server will require multiple "hops" between other servers and networking components. The fewer number of hops, the better. Most connections to a server on the Internet will include at least a dozen hops. To test:
    • With the command prompt open, type tracert xxx.xxx.xxx.xxx, replacing xxx.xxx.xxx.xxx with an IP address on the internet.
    • Press Enter and watch as each hop is pinged and logged. The first ping should be your computer, modem, or router, and the last ping should be your target address.
    • Notice that the response time for points farther away from you will be greater than those closer to you.