Literature Review and Proposal on Core Java

Literature Review
Core Java, Java programming or simply Java is a widely used and robust technology for software development and creation of applications. Therefore, Java is both a programming language and a platform. On the other hand, a platform is any hardware or software environmental setting where software developers run their programs. Therefore, since Java has its own environment (JRE) and API on which it runs, it is referred to as a platform. A person who might not have encountered Java might want to know where Java is used. According to the studies, there are approximately three billion devices running on Java. It means that there are many devices around the world where Java is currently being used. Some of the devices where Java is being used are (Levenick, 2006):

Desktop applications like the acrobat reader, media player, and antivirus among others
Several web applications such as javapoint.com
Mobile phone devices applications
Robotics
Embedded system
Types of Core Java Applications
As has been seen in the description above, Core Java is a programming language that is used in the process of developing systems, software, and applications. It develops that have the capability of working on the local machine and the Internet. The most known features of core Java is that it is object-oriented, and it works across all the platform languages. Therefore, there are various categories of programs which Java can be used to develop them such as (Russel, 2001):

Stand-alone applications
An application is a type of program that runs on a PC or any computer under the OS such as Windows, Mac OS, Linux, or Android of a computer or a mobile device. The process of creating an application in Java is similar to creating a program using another programming language. A stand-alone application can either be a graphical user interface (GUI) based or console based. Console based Java programs are the types of programs that run on being prompt by a command. Furthermore, such programs do not display any screen based on GUI. The output of such programs is console-based (Fain, 2011).

Figure 1: Console based Java Program
GUI based program are the type of Java programs that run stand-alone and can accept input from the user through a GUI based screen.

Figure 2: GUI-based Java Program
Web Applications
Web applications are the Java applications whose nature is based on the web. They are simply web-based, and they require a web browser to execute them. The web-based Java applications use a Server to store data. Every time a user sends a request to have the application executed, the user request is passed on to the server for an appropriate reply. Web-based applications come as an Applet or a Servlet.

Applets: These are Java programs that cannot work in any other environment except on the Internet. Therefore, they are specifically created for that purpose. These programs run through a browser embedded with a Java such as Firefox, Chrome, Internet Explorer, and Netscape among others. Applets are created through any Java development tool. It cannot work on the Internet without it being contained within a web page. Java Applets programs include games developments and visual effects among others (Gladychev, Patel, & O’Mahony, 1998).
p>
Figure 3: A Java Applet Program Screen
Servlets: Java is also appropriate for development of web-based n-tier applications. In a web-based Java application, the client sends a request to a server. The server accepts the request and processes it and sends a response to the client. The Java Application Programming Interfaces (APIs) on the server side address the program processes and request of the client’s response. The server sides APIs extend their capabilities of the standard Java APIs and are referred to as Java servlets or server side applets. An HTML processing of a form is a simple use of servlets. The servlets can also process databases as well as performing server side transactions. Servlets execute through web servers (Hunter & Crawford, 1998).
Distributed Applications

Distributed applications require a server to run. Additionally, the applications use several servers simultaneously to back up the data and information and prevent any losses that might occur. They are also called enterprise applications. Such applications include banking applications, and they are advantageous in that they have a high level of security, clustering, and load balancing. EJB is used to create enterprise applications in a Java development environment.

Database applications: They are distributed applications that use the JDBC API to connect to the database. They could either be applications or applets. However, applets may face security challenges in the database connections (Morgenthal, 1998).
Client Server Applications
Client server applications cannot execute without the availability of web technology. Therefore, they are web dependent. The application follows a less complicated Client-Server model in which a client sends a request to the server directly. Examples of such applications are Yahoo Chat. They are developed in Core Java and Web technologies (Kleinov & Lehmann, 2002).

Proposal
I will be attached to a company in the position of an intern as the software developer using Core Java. The software development process will largely entail a systematic research process to ensure that the development process is conducted according to the requirement, and it delivers the expected results. The internship will be a subdivision of four iterations where each of the iterations will entail different tasks and activiti

Iteration 1: Orientation – It includes an introduction to the company’s management, employees, and its code of conducts and operations. Furthermore, I will be introduced to the software development team and the department of IT from where I will be working.

Iteration 2: Training – The iteration includes being guided in the process of software development life cycle by the company’s experts in the development process. I will also be introduced to the company’s specific guidelines to the software development such as punctuality and adhering to professional ethics in the process.

Iteration 3: Gathering SDLC tools – The iteration includes collaborating with the software development team to identify and gather all the tools that the implementation phase will require. This includes setting up the computers on which the development will take place and installation the computers will necessary software as well as the JDK (Saini & Kaur, 2014).

Iteration 4: Implementation – The activities of the iteration will include the actual development of the software using Core Java. Therefore, we will follow the SDLC process from the first step to the last step.

Security and privacy impact

Introduction
The incidents relating to security are on the rise at an alarming rate each year. Additional there is an increase of these threats complexity so do measures for security that are needed to protect the networks. Network administrators, data center operator’s m, and other professionals in the data center have to comprehend the security basics so as to manage safely and deploy the networks of today.

The internet has transformed the way people connect in the present era. The use of the internet presents whole new options for organizations and users are it in social networking, e-commerce, and enterprises among others. Since many people are now using and enjoying the benefits of the internet, the main question is how well protected are the networks from intruders. For a long time the question has been the use of the firewall, but how long will it take for the firewall become extinct (Singer, and Friedman 2014).

This paper presents the current practice of securing the networks systems by use of firewalls to determine if they are becoming extinct. I the paper also outline the aspects that the network engineers should expect internet security to be in the next two years. I finally I will give a picture of how networks will be like in the next two years in light with the mobile devices proliferation (Kaplan, Chinn, and Marcus, 2015).

With the proliferation of devices with wireless productivity, such as tablets and smartphones, the number of devices having access and connections with the data centers are exploding. The proliferation increases the perimeter security burden since these devices enhance additional services accessibility from any location with a greater volume of traffic. The distributed denial of service (DDoS) attacks is taking toll of online businesses. Though some cases of DDoS attacks may occur from non-economic reasons as they were the case of the past, they are now being taken advantage of by attackers who are monetary driven including corporate revenue, competitive advantage, and extortion. About DDoS protection, many Internet data Centers operators and enterprises tend to have a false sense of security. They think their services security from the DDoS attacks by simply deploying firewalls and intrusion prevention systems in front of their services. However, these deployments do expose companies to irate customers and service outages. The IDC and enterprises lose money when there are on critical services of the business, and this damages their customer relationship. Additional when there are no services as a result of external attacks, it can be unwelcome and sensational front pages news damaging the reputation of the company yet it is a damage that can be prevented (Gehem, Usanov and Frinking 2015).

There is also a new type of DDos attack that threatens the viability of a business service provider. Thus, the attacks have the potential of harming the e-commerce. The firewalls, IPS devices and other products for security are vital aspects in a layered -defense strategy. However, they are only meant to solve security problems that are different from DDoS mitigation and detection products. The firewall only acts a policy were enforcing the prevention of access to unauthorized data. Additionally, the IPS devices are for blocking the in attempts that lead to theft of data. Moreover, the firewalls and IPS devices are in line, state solutions and they are vulnerable to the DDoS attacks since they become the targets.

Therefore in this moving, and the highly open world the walled -garden of the old approach to securing the computers as the intranets and firewalls are getting out of step (Abouzakhar, 2015).

What should network engineers expect to happen with security in 2 years?

Security professionals in the next two years are expected to update their skills in new technologies. They will adapt, update and identify skills of dealing with the state-backed espionage in democratic states since it will no longer be only for North Korea and China. Businesses will also face complications in Balkanized Internet which will no longer work. Thus, it is essential for the internet engineers to maintain and coordinate partnership regarding information sharing across the servers. It will provide stronger support to cyber resilience and engage other multi-stakeholders in the process of governance in sharing intelligence (Lindstrom, 2008). The accessibility of web-based services from a broader internet will be the main target for activists, competitors, and others for political or negative agenda (Stevens, 2015).

Also, as data centers become more focused on the users, the customers and employee will increasingly depend on the internet services. Therefore, there is a need for enterprises to ensure that their main data center services maintain accessibility not just within the technical contingencies but also from the motivated opposition (Brenner, 2011).

The increasing connectivity as a result of the internet use and its ability to accessibility anywhere means that it is vital to segment properly the internal network by ensuring that the internal threats, as well as improper accesses, are not allowed to the data center. The core firewall segmentation should at the same time keep increasing its speed within the network core what will networks look like in 2 years, given the proliferation of mobile devices?

Traffic for mobile devices will need major emphasis on small packet performance with the gearing of data center applications towards smaller bites and screens of information. Other solutions for network security will also be for them to attain their performance specifications similar to the larger packet sizes. However, they can significantly degrade when traffic shifts to the smaller packet sizes and larger numbers of users. With the increase of the care network, there will be the need for high -speed 100 GbE and 40 GbE, as well as high port density, becomes vital. Also, there will be a need for network security appliances applicable throughout the data centers so as to connect efficiently within the high-speed fabric network (Lee 2015).

Conclusion
As the fight against cyber warfare and online crime continues to grow, and then there is the need for highly trained professionals on cyber security with relevant skills. Predicting the state of cyber security in the next few years gives an opportunity for every IT security engineers to perfect his or her skills.

Selecting the Best primary school in Gurgaon is the best way to make your child’s future

Primary education is mainly responsible for the education acquired in life. Along with teaching, all the qualities received during this period drive you throughout your life. All the learning and qualities acquired during this period will help students become responsible citizens. The best primary school in Gurgaon always helps the student to uncover his hidden potential and take him to the maximum.

Why choose the best primary school in Gurgaon
When students go to primary school, they consider this place as a different world, which is considered as a junction with the outside world for students between the ages of six and twelve. Through this phase education system, students are exposed to current innovative ideas. As a result, their concept of modern education is born. Teachers bring educational, real-world content into the classroom in a way that students can experience on their own. Children are sent to school at this age to learn the lessons of the new world. An excellent primary school has its own norms, rules, and structures, in which students learn to be good people in the future.

All parents want to provide quality education to their children to strengthen them for future life, which is the highest right of every child. So they try to select the best school for their children. They think that choosing a good school sends the child on a perfect education path. But parents should choose the way very carefully and wisely, which is not very difficult.

If you live in Gurgaon, choosing an excellent primary school is very difficult among the Top 10 School in Gurgaon because day by day, primary and secondary schools in Gurgaon are increasing. But if you want to choose the best school, there are some things you need to consider.

Best Primary School in Gurgaon for Your Kids is the best way of learning

According to experts, if you give your child a proper early education, he will surely grow up to be a responsible adult. For overall development, Gurgaon’s primary schools have a student-centric approach that greatly helps develop children. The best primary schools get so much popularity for a few reasons

A team of skilled and well-trained teachers and staff
Offer a specially designed curriculum that makes learning fun and interesting
Focus on perfectly designed co-curricular activities
Some important factors that need to be considered while choosing the best primary school:

1. Don’t ignore the Fee structure of the school.

You have to choose the good schools in Gurgaon which not only take the low fees but also offer the comparatively best education. You should give up the idea of rushing to enroll your child on an expensive school. So, you have to give up the idea of registering your child’s name in a costly school.

2. Check the Students-teacher relationship in the school:

Student-teacher solid relationships are always the best students for the future. In a good primary school, The teacher usually communicates with each student separately. Research has shown that students learn better in smaller classes and achieve higher exam scores.

3. Emphasize on academic & Extra-Curricular Activities of the school.

The learning process of primary school can stay with your child for life. So it is essential to ensure before selecting the school that it meets the highest standards of excellence in terms of its teaching methodology, academic curriculum, moral standards, and teachers.Extra-curricular activities such as outdoor games, art & craft, hobby ideas, physical education, music, dance, and drama classes also play a big part in shaping the overall personality of a child. It can add an edge to the student’s capacity to learn.

4. Check the Hygiene/Clean Environment in the school.

When selecting a good school, you should consider the cleanliness and hygiene of the school environment. When you think about your child, it should be your massive priority. As a parent, you have to know if it is maintained in the school or not.