Your search did not yield any results.

Feel free to contact us in the event that the training you require is not listed. We may be in a position to offer this training by way of our partners or by creating a tailored class.

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

Viruses, trojans, and other malicious programs are everywhere. There's always a new threat to your computer's security, and many of these threats invade your computer without you even knowing. Most viruses aren't going to loudly announce themselves, so it's important to know the hidden ways in which your computer can become infected.


Infected Files from Other Computers

Whether you're borrowing someone's flash drive or grabbing a file from their computer, your computer can become infected if the file or device you're using already contains a virus, trojan, or other form of malware.

This is a very common issue, and you won't even know there's a problem most of the time. For example, if your computer is connected to other devices on a network, and you decide to pull an important file off of another computer on the network, your computer will become infected if the file you took has a virus attached to it.

Also, if you forgot your flash drive, and you need to use your friend or coworker's device for the day, then even plugging the device into your computer can cause the infection in the flash drive to be transmitted.


Downloading Legitimate Programs

Another way your computer can be secretly infected is when you download a legitimate program and run it. There are numerous legitimate programs on the internet that can help you in many ways. The programs themselves could be infected, though.

Also, one of the most common ways your computer can become infected is when you don't read the fine print before you download a program. Some of them may insist that you install another small program in addition to the one you initially chose. The boxes that you are supposed to click to give your consent may already be clicked.

This small extra program is the one that may carry an infection that will spread to your computer when you run the main program. You may get a lot of good use out of the legitimate program, but the virus attached to the extra hidden program can cause you a lot of trouble.


Using Vulnerable Applications

Security is a serious matter. If even one of the applications you use on your computer is vulnerable to becoming hacked or infected, then your entire computer is at risk and could become secretly infected. Anything from PDF viewing applications to your operating system can become infected if you don't download the latest security patches and keep everything up-to-date.


Not Using Antivirus Software

Antivirus software can protect your computer from a number of viruses, trojans, and other problems. Your computer can become infected in a number of ways, so you need to have good antivirus software to provide strong protection from hidden attacks.


Viruses, trojans, and other malware can infect your computer in a variety of hidden ways. To prevent infection and problems, you need to be careful about what you download, and you should keep your applications secure. Also, find reliable antivirus software to help.

 

Related:

How Do IT Placement Agencies Work?

5 Disruptive Technologies for the Enterprise: What are the Implications?

I will begin our blog on Java Tutorial with an incredibly important aspect of java development:  memory management.  The importance of this topic should not be minimized as an application's performance and footprint size are at stake.

From the outset, the Java Virtual Machine (JVM) manages memory via a mechanism known as Garbage Collection (GC).  The Garbage collector

  • Manages the heap memory.   All obects are stored on the heap; therefore, all objects are managed.  The keyword, new, allocates the requisite memory to instantiate an object and places the newly allocated memory on the heap.  This object is marked as live until it is no longer being reference.
  • Deallocates or reclaims those objects that are no longer being referened. 
  • Traditionally, employs a Mark and Sweep algorithm.  In the mark phase, the collector identifies which objects are still alive.  The sweep phase identifies objects that are no longer alive.
  • Deallocates the memory of objects that are not marked as live.
  • Is automatically run by the JVM and not explicitely called by the Java developer.  Unlike languages such as C++, the Java developer has no explict control over memory management.
  • Does not manage the stack.  Local primitive types and local object references are not managed by the GC.

So if the Java developer has no control over memory management, why even worry about the GC?  It turns out that memory management is an integral part of an application's performance, all things being equal.  The more memory that is required for the application to run, the greater the likelihood that computational efficiency suffers. To that end, the developer has to take into account the amount of memory being allocated when writing code.  This translates into the amount of heap memory being consumed.

Memory is split into two types:  stack and heap.  Stack memory is memory set aside for a thread of execution e.g. a function.  When a function is called, a block of memory is reserved for those variables local to the function, provided that they are either a type of Java primitive or an object reference.  Upon runtime completion of the function call, the reserved memory block is now available for the next thread of execution.  Heap memory, on the otherhand, is dynamically allocated.  That is, there is no set pattern for allocating or deallocating this memory.  Therefore, keeping track or managing this type of memory is a complicated process. In Java, such memory is allocated when instantiating an object:

String s = new String();  // new operator being employed
String m = "A String";    /* object instantiated by the JVM and then being set to a value.  The JVM
calls the new operator */

 
 
Python is a powerful tool that can be used for many automation tasks in the workplace. It’s notorious for being one of the most simple and versatile options available in the world of programming languages. For this reason, many people choose to automate an enormous amount of their workflow with Python. We’ve compiled a few ideas for automating the boring stuff using Python. Let’s take a look.
 
Managing Emails
 
Most businesses rely on emails being sent out regularly in order to ensure everything runs smoothly. Doing this by hand can be boring and time-consuming. To alleviate this, there are packages written with and for Python that enable you to automate certain aspects of this process. Adding and removing individuals from mailing lists can be automated as well, especially if your business has a policy to automatically add and remove people from certain mailing lists when certain conditions are met. For example, after a customer of yours doesn’t interact with your company after an extended period of time, it may be prudent to remove them from your mailing list, or you can send them a premade email reminding them of your services. This is just one way that you can save your company time and money using automation with Python.
 
Repetitive File System Operations
 
Even for personal tasks, Python excels at performing repetitive file system operations. For example, it can convert files, rename, move, delete, and sort files as much as you need it to. This can be useful in many ways. If you have a folder of mp3 files that you need to compress, this can be sped up using Python. Additionally, you can create a set of criteria that need to be met in order for a given file to be considered useless, and then delete it. As a side note, be extremely careful when automating any sort of file deletion or altering, because a bug in your program can cause severe damage to your data and even to your computer. Still, these tools are extremely powerful and can be life-saving when used properly. 
 
Start-up Tasks
 
Whether you’re running a server or just using your own personal computer, there are always tasks that need to be done when your computer starts up, or you’re beginning a certain process. For example, you can automate the task of backing up your email inbox. This can ensure your files are being kept safe, and it can be triggered whenever your start up your computer. Additionally, if you need to collect or create any sort of logging data in order to document daily operations, you can use Python to alleviate some of these time-consuming processes. 
 
Web Scraping
 
And finally, we have Web Scraping. This process may be slightly more advanced for a beginner Python user, but it doesn’t take a terribly long time to learn, and it opens up a whole new world of opportunity in terms of data collection and management. Web scraping is extremely important because it not only allows you to automatically search for certain pieces of content on the internet, but it can also alert you to changes and updates to existing websites. If your business relies on certain trends on social media, you can scrape sites while searching for the presence of certain keywords, and if you’re a stock trader or bitcoin guru, you can automate some of your price-checking and set custom alerts for price changes. The field of web scraping is enormous, and there is a practically infinite amount of content written on this particular subject. If you’re interested in learning more, there are vast amounts of free resources on the internet that can help you get started. Web scraping is certainly one of the most important skills to have in almost any line of work.
 
Get Creative!
 
At this point, we’d like to advise you to get more familiar with the libraries and APIs that are available to you. Each individual workflow is different and requires familiarity with different technologies. Because of this, you will know better than anybody else which items are worth automating and which aren’t. Some people try to automate everything, and some people prefer to do certain tasks manually, but sometimes spending a few hours automating a job that takes one minute will end up being a time-saver after only a few months.
 
We’ve gone over quite a few options in this article, but no single human alive is familiar with absolutely everything Python can do. Hopefully, you’re now more familiar with the options available to you, and you should now be better equipped to search for further information that is more relevant to your specific use case. Have fun digging into the many nuances and functionalities that the Python language has to offer!

Data has always been important to business. While it wasn't long ago that businesses kept minimal information on people who bought their products, nowadays companies keep vast amounts of data. In the late 20th century, marketers began to take demographics seriously. It was hard to keep track of so much information without the help of computers.

Only large companies in the '60s and '70s could afford the research necessary to deliver real marketing insight. The marketers of yesteryear relied upon focus groups and expensive experiments to gauge consumer behavior in a controlled environment. Today even the smallest of companies can have access to a rich array of real-world data about their consumers' behavior and their consumers. The amount of data that is stored today dwarfs the data of only a few years ago by several orders of magnitude.

So what kind of information are businesses storing for marketing purposes? Some examples include:

- Demographic information — age, gender, ethnicity, education, occupation and various other individual characteristics.

training details locations, tags and why hsg

the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about programming
  • Get your questions answered by easy to follow, organized experts
  • Get up to speed with vital programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
nstore/product,  , nstore/product,  Classes, nstore/product,  Courses, nstore/product,  Course, nstore/product,  Seminar
nearsourcing, reshoring and insourcing
developing talent and expertise at home
Companies are beginning to realize that talent and skills developed within the United States are exceedingly more important for the growth of an organization than the alternative: outsourcing. Considerations include: security, piracy, cultural differences, productivity, maintainability and time to market delays.
In the past, the reason for outsourcing centered on cost savings, lack of resources at home and the need to keep up with market trends. These considerations are proving to be of little merit as many organizations have, consequently, experienced productivity declines, are now finding considerable talent within their immediate location and have realized a need to gain more control over product development.
As strong advocates of Agile/Scrum development, HSG whole heartedly embraces this new entrepreneurial spirit because we know it works and because we believe our country's future weighs in the balance.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.