A Blog on Building Software

UML Diagram
N + 1 – the main cause of the poor performance of JEE applications coded with JPA
Introduction A while ago, when I was still a junior Java developer, one of my colleagues had the ambition to do just OOP, without coding SQL at all. Back then we were using Hibernate ORM 3, which had just been introduced; JPA was not present yet and doing OOP with Hibernate meant using Hibernate Criteria to generate database queries – Oracle Database Server for the project I am discussing. My colleague systematically refused anything that meant SQL, considering that Hibernate ORM was intellige
ASP.NET vs ASP.NET Core
Introduction to .NET Core
What is .NET Core? Since the appearance of .NET, from .NET Compact Framework to Silverlight, or from Windows Phone to other Windows Store applications, software developers had to deal with fragmented versions of .NET. Although all this versions should have had a so-called ‘’common’’ runtime, they each ended up being a different subset of .NET for each platform in the Microsoft Suite.Figure 1 – .NET for each platform Each of the existing versions has and will always have different
Mockup Example
Wireframes, Mockups and Prototypes – What Are They?
In the context of a rapidly increasing number of tech startups and web applications on the market, concepts like wireframes, mockups and prototypes are more and more present in the vocabulary and toolkit of product owners, marketing people and software engineers. Yet, I have often noticed that these terms have different meanings for different groups or people and that the distinction between them if often vague or misunderstood. This, in turn, can lead to confusion and even to unsatisfactory re
Logged In on Wordpress with Clef
Clef – a magical 2 Factor Authentication (2FA) for WordPress
Why is 2 factor authentication (2FA) necessary? We live in a world with increasing digital crime, a world in which the amount of internet fraud is ever increasing, issue that worries those in charge with database security. The classic one factor authentication has been proven weak, even with the latest attempts at forcing the setup of strong passwords and heavy hashing. The Privacy Rights Clearinghouse has been maintaining a database of security breaches since 2005. This is a searchable database
Fortech at the Spring I/O 2016 Conference
Spring I/O 2016 Highlights
A delegation of six Java engineers attended this year’s edition of Spring I/O, the largest European conference on Spring, held in Barcelona between the 19th and the 20th of May. The event included two days of keynotes, presentations and workshops on the most recent and upcoming developments in the Spring Framework. I am happy to be sharing below some takeaways from the conference.The event kicked off by emphasizing the upcoming changes to Spring Boot 1.4 GA (i.e. General Availability), s
ReactJs
The Challenges of Building a Production Ready Application in the React.js Ecosystem
It’s been a full year since I started working with React on a production application. I think the time is right to share some of my thoughts about the framework and the entire React ecosystem. Do not expect to learn React by reading this post or to understand some of the concepts presented without any prior knowledge of the framework. My thoughts may prove helpful if you seek insights into the platform or need to decide if React is a good match for your project. I will focus on the parts that
code_blogpost-2
How to build a Pan & Zoom Plugin Using the Revealing Module Pattern
In one of our recent projects, we had to devise a solution for the virtual visitors of a large shopping mall, which has an overwhelming diversity of businesses, brands, activities and services. What we needed was a surface map that would interact with the user, so that they could search for points of interest, be taken there and shown key information on the fly. The source serving the map had to be dynamic and thus would be changed frequently and updated as a ‘dumb’ SVG file; the live map wo
BlogPostMachineLearningAppliedtoRevenueManagement
Machine Learning Applied to Revenue Management
The article summarized below was published by Marius Radu in the 44th number of Today Software Magazine. The author’s objectives were to analyze the current state of Machine Learning (ML) software applications from the business and product owners’ perspectives and to provide support to those looking for answers to questions regarding the data volumes and computational power required by ML. Three types of stakeholders can take part in or influence the application development of ML sol
Marketing Through the Digital “Window”
Marketing Through the Digital “Window”. An Enlarged View for 2016
The new year is upon us, with many events already happening. January ended with the launch of the 43rd issue of Today Software Magazine (TSM). This issue presents a few short predictions for 2016 as seen by the local IT managers as well as articles covering both technical and general business topics. Our colleague and marketing manager contributed with an article on digital marketing. This outlines the key principles and the perspective from which a business should address brand communication in
Software Outsourcing Versus Own Product Development
Software Outsourcing Versus Own Product Development
While the software outsourcing field gets richer in achievements with each passing day, own product development is almost virgin ground in Cluj-Napoca, where about 80% of the IT companies do only outsourcing. These two types of activities differ greatly from the core up, the main differentiating factor being their business model. While each of the two models work based on inputs, outputs and work processes, taking a close look at each of these components reveals major differences.In an outsour
Speaker during Embracing Change in IT Conference at Fortech
Embracing Change in IT
Change management was the leitmotiv of the week at Fortech, especially on Thursday and Friday when our „Embracing Change in IT” conference took place. Whether we talk about professional or organizational development, change has become an implicit requirement in our pursuit for excellence. The larger context in which a business operates triggers changes at the organizational level. Further on, these adjustments are transferred as required competencies at the individual level. Given this fact,
FortechCelebratingHalloween
Halloween at Fortech
The Celtic celebration of “hallowed evening” or, in common use, Halloween, has visited Fortech and covered it in splendor and horror on October 30th. Creepy faces, awful sweets, spooky decorations, strangers in the offices had drawn the specific atmosphere of “After work horror”. For Halloween, Fortech organized a group contest and involved our colleagues to decorate their offices in the most beautiful, strange or totally spooky way. There were a lot of interesting artistic decorations,