Carnegie Mellon University professor Manuela Veloso has spent her career developing autonomous collaborative robots (CoBots). The CoBots run a combination of C++, Python, and Java, and consist of a camera and laptop on a wheeled base, while a Microsoft Kinect is used for navigation and obstacle avoidance. Users assign tasks to the CoBot via a Web interface, and once the task is completed, the CoBot can either return to its home base or move on to the next assigned task. Veloso eventually wants to develop CoBots that can perform daily human tasks alongside their human masters. "I decided that ... these robots ... need a symbiotic relationship with humans, and they need to proactively ask for help when they need help," Veloso says. Her research is focused on symbiotic autonomy, in which robots move through the world by themselves, but if they come across uncertainties about their location, or if what they are doing surpasses the threshold of their capabilities, they stop and ask humans for help. "The reason why I came up with symbiotic autonomy was exactly because I started looking at these robots performing tasks and services for humans as part of a team," Veloso says.
(en) A lebanese Java User Group at Cnam Liban university. Articles in English or French. (fr) Groupe d'utilisateurs Java Liban. Articles en français ou anglais. This blog is the index toward contents (in general) on others sites. It helps the Group to stress on current activities.
mercredi 26 décembre 2012
Robot Master
Carnegie Mellon University professor Manuela Veloso has spent her career developing autonomous collaborative robots (CoBots). The CoBots run a combination of C++, Python, and Java, and consist of a camera and laptop on a wheeled base, while a Microsoft Kinect is used for navigation and obstacle avoidance. Users assign tasks to the CoBot via a Web interface, and once the task is completed, the CoBot can either return to its home base or move on to the next assigned task. Veloso eventually wants to develop CoBots that can perform daily human tasks alongside their human masters. "I decided that ... these robots ... need a symbiotic relationship with humans, and they need to proactively ask for help when they need help," Veloso says. Her research is focused on symbiotic autonomy, in which robots move through the world by themselves, but if they come across uncertainties about their location, or if what they are doing surpasses the threshold of their capabilities, they stop and ask humans for help. "The reason why I came up with symbiotic autonomy was exactly because I started looking at these robots performing tasks and services for humans as part of a team," Veloso says.
vendredi 14 décembre 2012
A full e-commerce tutorial for J2EE with netbeans
- Introduction
- Designing the Application
- Setting up the Development Environment
- Designing the Data Model
- Preparing the Page Views and Controller Servlet
- Connecting the Application to the Database
- Adding Entity Classes and Session Beans
- Managing Sessions
- Integrating Transactional Business Logic
- Adding Language Support
- Securing the Application
- Testing and Profiling
- Conclusion
Authenticate web applications BASIC, DIGEST, FORM, and CLIENT-CERT
Securing Web Applications
Web applications are created by application developers who give, sell, or otherwise transfer the application to an application deployer for installation into a runtime environment. Application developers communicate how to set up security for the deployed application by using annotations or deployment descriptors. This information is passed on to the deployer, who uses it to define method permissions for security roles, set up user authentication, and set up the appropriate transport mechanism. If the application developer doesn’t define security requirements, the deployer will have to determine the security requirements independently.Some elements necessary for security in a web application cannot be specified as annotations for all types of web applications. This post point to links to give you a start for how to secure web applications using annotations wherever possible.
http://docs.oracle.com/javaee/6/tutorial/doc/gkbaa.html
samedi 8 décembre 2012
In MLB.com Challenge, College Students Pitch Tech Ideas
From ACM TechNews:
In MLB.com Challenge, College Students Pitch Tech Ideas
InformationWeek
(12/06/12) Michael Endler
The MLB.com College Challenge, a competition cosponsored by the Syracuse University's School of Information Studies and Major League Baseball Advanced Media, offers participants a chance to solve some of MLB.com's real-world tech challenges, and an opportunity to pitch solutions to MLB representatives. The challenge encourages students from varied backgrounds to participate, serving as a model for helping students find jobs, as well as encouraging technological innovation to flourish in more places. In a previous competition, the winning project presented a way to merge all of the social media documents that a single game might produce, including smartphone photos, tweets, and Facebook status updates, into a single interface. This year's competition, which recently completed its third edition, focused on how MLB.com could harness the trend of "gamification" to engage fans. The winning project was a novel approach to fantasy baseball with gamification elements and competitive social challenges to share the experience with friends. Syracuse professor Jeffery Rubin, one of the competition's organizers, notes the hackathon is an interdisciplinary challenge. "It's not the most technical project that wins--but the best idea," Rubin says.
View Full Article
http://www.informationweek.com/global-cio/training/in-mlbcom-challenge-college-students-pit/240143942
jeudi 6 décembre 2012
Introducing EE6
vendredi 30 novembre 2012
Java Inventor James Gosling Building Smart Marine Robots
From ACM TechNews:
Java Inventor James Gosling Building Smart Marine Robots
Network World
(11/27/12) Ellen Messmer
Java inventor James Gosling is using Java's security framework to design marine robots that can be sent across the ocean to gather weather data or carry out research projects. "I'm using all the crypto [application programming interfaces (APIs)] and the sandbox APIs and the Java DE [development environment] and NetBeans," Gosling says. He is helping design underwater robots that use satellite-based remote controls, as well as cellular signals when close to shore to cross the seas, sometimes for months at a time, to perform tasks such as the collection of weather data or the monitoring of pollution levels. One of the robots is being designed to be more aware about its environment so it can navigate more on its own without remote control or preprogramming. Gosling also notes that work is underway to optimize communications since satellite use can be costly and bandwidth-intensive. "It's all Java code, a new generation of robots that's all Java on the inside," he says. Although the original Java programming language has expanded its security structure over the years, it adheres to its basic principle of the security sandbox set of rules to battle hostile code and offer solutions to implement public-key infrastructure, authentication, and access control mechanisms.
View Full Article
http://www.networkworld.com/news/2012/112712-gosling-264555.html
Checkout sub directories in git (sparse checkouts)
//TODO en Français
- clone the other repository (in my case, for a Rails app, I did it in vendor/plugins/)
git clone <repository_url> <directory>
- cd to <directory>
cd <directory>
- enable sparsecheckout
git config core.sparsecheckout true
- add directories you want to have in your checkout to
.git/info/sparse-checkout
, e.g.echo app/models/ > .git/info/sparse-checkout echo lib/ >> .git/info/sparse-checkout
- run read-tree
git read-tree -m -u HEAD
ls
now showsapp lib
mardi 27 novembre 2012
Demarche recommendée pour tâches dans LJUG et les sous projets
Pré-requi être membre du goupe rejoindre l'un des projets de la LJUG (http://java.net/projects/ljuginfrastructure/watch ou http://java.net/projects/ljug/watch)
Action: Créer une "tâche" dans "suivi des problèmes" représentant votre requête ou votre soucis
Résultat: Attendre et suivre que la tâche soit résolu, Les tâche sont classé par nombre de vote!
Par exemple dans ljug : http://java.net/jira/browse/LJUGINFRASTRUCTURE
et dans ljuginfrastructure : http://java.net/jira/browse/LJUG
Bien sûre tous ces liens sont disponibles sur les pages principales des projets dans java.net
samedi 24 novembre 2012
Why join Lebanese Java User Group
Groupe Utilsateurs Java : Liban |
- Portal to all supports and materials concerning (javacard, javamobile, j2se, j2ee, Android, and others ...)
- Repository of all documents related to Java published by Teachers, students and members
- Repository of programms and code for meanfull projects produced by members of the "Lebanese Java User Group"
LJUG is a Java User Groups (JUGs)
Joining and Getting More Involved in LJUG Projects
If you want to get involved with LJUG project, you can do a couple of things.- You can click the Bookmark link on LJUG home page and instantly get an Observer role. This will add the project and its forum information to your MyPage.
- If you want to get more involved, start connecting with other members of the project in that project's forums or mailing lists, and get to know how the project is being worked or managed. Once you get to know everyone, try asking one of the project administrators for a higher role in the project like Software Developer, tester or Content Developer.
Possible Roles
Role | Description |
---|---|
Administrator | The Big Cheese, Head Honcho, King of the Mountain. Owns the project and can do anything they like with it. |
Software Developer | Top level developer. Do what ever you want with the code. |
Tester | Tests the project software to make sure it works. AKA quality assurance (QA) person. |
Content Developer | Second level developer. We trust you, but not that much |
Observer | You are here to watch, comment, and connect. |
jeudi 22 novembre 2012
Generate public/private ssh key for java.net and git use on Windows with putty
Setting up PuTTY and Generating a Key
- Start PuTTYgen by clicking Start > All Programs > PuTTY > PuTTYgen.
- At the bottom of the window, click SSH-2 RSA to generate the most secure kind of key. Project Kenai requires an SSH-2 key.
- Click Generate and move the mouse around until the key starts generating.
- When the key is generated, you see the public key listed in the Public Key for Pasting box at the top of the window.
- Optionally enter a passphrase for the key, which makes it more secure on your machine.
- Click Save public key and save it in a file in your user directory. For example, you might save it in
C:\Documents and Settings\your-user-name\.ssh\puttypublickey-ssh2rsa
Note: You can use the Command window to see what your user directory is. On the command line, enter echo %USERPROFILE%. - Click Save private key to save the private key to a file in the same directory as your public key. For example, you might save it in
C:\Documents and Settings\your-user-name\.ssh\puttyprivatekey-ssh2rsa.ppk - Keep PuTTYgen open so you can copy and paste your public key to your Project Kenai account. (See next section.)
Copying the Public Key to Project java.net
- In a browser, log in to Project Kenai.
- If necessary, open your My Page.
- Click Edit My Profile in the left navbar.
- On the My Profile edit page, click the SSH Keys tab.
- Copy the public key from PuTTYgen and then follow the instructions at Adding an SSH Key to Your Profile.
mercredi 21 novembre 2012
New Java User Group
It is mainly hosted on java.net at http://java.net/projects/ljug/pages/Home
It still incubating
To join create a java.net account and send me an email with the username and motivation at ljug@cofares.net
This blog will be a complement for essential news about LJUG