.NET Training Classes in Austin, Texas

Learn .NET in Austin, Texas and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current .NET related training offerings in Austin, Texas: .NET Training

We offer private customized training for groups of 3 or more attendees.

.NET Training Catalog

cost: $ 1890length: 4 day(s)
cost: $ 1190length: 3 day(s)
cost: $ 1390length: 3 day(s)
cost: $ 1190length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1685length: 4 day(s)
cost: $ 2190length: 5 day(s)
cost: $ 1590length: 4 day(s)
cost: $ 890length: 1 day(s)
cost: $ 1090length: 3 day(s)
cost: $ 1590length: 4 day(s)
cost: $ 1190length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1890length: 4 day(s)
cost: $ 2090length: 4 day(s)

C# Programming Classes

cost: $ 890length: 2 day(s)
cost: $ 790length: 2 day(s)
cost: $ 990length: 2 day(s)
cost: $ 2090length: 5 day(s)

Design Patterns Classes

cost: $ 1750length: 3 day(s)

F# Programming Classes

cost: $ 790length: 2 day(s)

JUnit, TDD, CPTC, Web Penetration Classes

Microsoft Development Classes

cost: $ 790length: 2 day(s)

Microsoft Windows Server Classes

cost: $ 3200length: 9 day(s)

SharePoint Classes

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

I will begin our blog on Java Tutorial with an incredibly important aspect of java development:  memory management.  The importance of this topic should not be minimized as an application's performance and footprint size are at stake.

From the outset, the Java Virtual Machine (JVM) manages memory via a mechanism known as Garbage Collection (GC).  The Garbage collector

  • Manages the heap memory.   All obects are stored on the heap; therefore, all objects are managed.  The keyword, new, allocates the requisite memory to instantiate an object and places the newly allocated memory on the heap.  This object is marked as live until it is no longer being reference.
  • Deallocates or reclaims those objects that are no longer being referened. 
  • Traditionally, employs a Mark and Sweep algorithm.  In the mark phase, the collector identifies which objects are still alive.  The sweep phase identifies objects that are no longer alive.
  • Deallocates the memory of objects that are not marked as live.
  • Is automatically run by the JVM and not explicitely called by the Java developer.  Unlike languages such as C++, the Java developer has no explict control over memory management.
  • Does not manage the stack.  Local primitive types and local object references are not managed by the GC.

So if the Java developer has no control over memory management, why even worry about the GC?  It turns out that memory management is an integral part of an application's performance, all things being equal.  The more memory that is required for the application to run, the greater the likelihood that computational efficiency suffers. To that end, the developer has to take into account the amount of memory being allocated when writing code.  This translates into the amount of heap memory being consumed.

Memory is split into two types:  stack and heap.  Stack memory is memory set aside for a thread of execution e.g. a function.  When a function is called, a block of memory is reserved for those variables local to the function, provided that they are either a type of Java primitive or an object reference.  Upon runtime completion of the function call, the reserved memory block is now available for the next thread of execution.  Heap memory, on the otherhand, is dynamically allocated.  That is, there is no set pattern for allocating or deallocating this memory.  Therefore, keeping track or managing this type of memory is a complicated process. In Java, such memory is allocated when instantiating an object:

String s = new String();  // new operator being employed
String m = "A String";    /* object instantiated by the JVM and then being set to a value.  The JVM
calls the new operator */

Let’s face it, fad or not, companies are starting to ask themselves how they could possibly use machine learning and AI technologies in their organization. Many are being lured by the promise of profits by discovering winning patterns with algorithms that will enable solid predictions… The reality is that most technology and business professionals do not have sufficient understanding of how machine learning works and where it can be applied.  For a lot of firms, the focus still tends to be on small-scale changes instead of focusing on what really matters…tackling their approach to machine learning.

In the recent Wall Street Journal article, Machine Learning at Scale Remains Elusive for Many Firms, Steven Norton captures interesting comments from the industry’s data science experts. In the article, he quotes panelists from the MIT Digital Economy Conference in NYC, on businesses current practices with AI and machine learning. All agree on the fact that, for all the talk of Machine Learning and AI’s potential in the enterprise, many firms aren’t yet equipped to take advantage of it fully.

Panelist,  Michael Chui, partner at McKinsey Global Institute states that “If a company just mechanically says OK, I’ll automate this little activity here and this little activity there, rather than re-thinking the entire process and how it can be enabled by technology, they usually get very little value out of it. “Few companies have deployed these technologies in a core business process or at scale.”

Panelist, Hilary Mason, general manager at Cloudera Inc., had this to say, “With very few exceptions, every company we work with wants to start with a cost-savings application of automation.” “Most organizations are not set up to do this well.”

As much as we love to assume free Wi-Fi is secure, this is far from the truth. Because you are attaching to a service many others are connected to as well, without security measures, your device can be hacked, especially if the network is unencrypted. Because this encryption involves handing out a 26-character hexadecimal key to every individual wanting to use that network, most places opt for ease of access over security. And even with a secure network, your information is vulnerable to everyone else who has the password and is on the network.

This may not seem like such a big deal and many people don’t believe they have anything to hide on their personal devices, but remember what you use on those devices. Chances are your e-mail is attached as well as all other social media sites. You may have apps that track your finances or private messages to certain others that you would never want anyone else to see. Luckily, there are steps that can be taken to reduce and prevent any unwanted information grabbers from accessing your personal information.

To start, go through your computer’s settings in order to verify your operating system’s security functions are all set to offer the highest protection. Open up the Control Panel and double check that your Firewall is enabled for both private and public networks. Then, go to Network and Sharing to open Change advanced sharing settings. In here, you can turn off file and printer sharing and network discovery for public networks.

One of the most important things to watch for is HTTPS. Hypertext Transfer Protocol Secure ensures secure communication across the web. Many of the major email systems use this when you log in (as another layer of password protection) but drop the security as soon as the login is complete. To keep this going, HTTPS Everywhere is a browser extension that gives you a secure connection when browsing some of the more popular sites. It can also be programmed for other sites you like to visit that don’t use HTTPS.

Not every place on the internet provides the choice of HTTPS, and VPNs are there to fill in the security gap. Virtual Private Networks allows data to be sent and received through public access points as if it were directly connected to a secure network. Many businesses offer this for company devices, but if you are an individual looking for that kind of security, ProXPN is a free version that can be upgraded. Unfortunately, it limits your speed, but other choices include VPNBook, OpenVPN Shield Exchange, and OkayFreedom.

With these three steps implemented, secure public Wi-Fi can be achieved. No longer will you have to worry about connecting in an unsure environment with strangers, never knowing if your information is being stolen. With all of the options free of charge, it is also an affordable means of protecting yourself that only takes a little time and effort to implement and guarantee safety.

 

In Demand IT Skills

Password Management Tools

Net Neutrality for the Layperson

What are a few unique pieces of career advice that nobody ever mentions?

Being treated like a twelve year old at work by a Tasmanian-devil-manager and not sure what to do about it? It is simply a well-known fact that no one likes to be micro managed. Not only do they not like to be micro managed, but tend to quit for this very reason. Unfortunately the percentage of people leaving their jobs for this reason is higher that you would imagine. Recently, an employee retention report conducted by TINYpulse, an employee engagement firm, surveyed 400 full-time U.S. employees concluded that, "supervisors can make or break employee retention."

As companies mature, their ability to manage can be significant to their bottom line as employee morale, high staff turnover and the cost of training new employees can easily reduce productivity and consequently client satisfaction.  In many cases, there is a thin line between effective managing and micro managing practices. Most managers avoid micro managing their employees. However, a decent percentage of them have yet to find effective ways to get the most of their co-workers.  They trap themselves by disempowering people's ability to do their work when they hover over them and create an unpleasant working environment. This behavior may come in the form of incessant emailing, everything having to be done a certain way (their way), desk hovering, and a need to control every part of an enterprise, no matter how small.

Superimpose the micro manager into the popular practice of Agile-SCRUM methodology and you can imagine the creative ways they can monitor everything in a team, situation, or place. Although, not always a bad thing, excessive control, can lead to burnout of managers and teams alike.  As predicted, agile project management has become increasingly popular in the last couple of decades in project planning, particularly in software development.  Agile methodology when put into practice, especially in IT, can mean releasing faster functional software than with the traditional development methods. When done right, it enables users to get some of the business benefits of the new software faster as well as enabling the software team to get rapid feedback on the software's scope and direction.

Despite its advantages, most organizations have not been able to go “all agile” at once. Rather, some experiment with their own interpretation of agile when transitioning.  A purist approach for instance, can lead to an unnecessarily high agile project failure, especially for those that rely on tight controls, rigid structures and cost-benefit analysis.  As an example, a premature and rather rapid replacement of traditional development without fully understating the implications of the changeover process or job roles within the project results in failure for many organizations.  

Tech Life in Texas

Austin may be considered the live music capital of the world but the field of technology is becoming the new norm in the The Lone Star State. Home to Dell and Compaq computers, there is a reason why central Texas is often referred to as the Silicon Valley of the south. It?s rated third on the charts of the top computer places in the United States with a social learning and training IT atmosphere. Adding the fact that Austin offers fairly inexpensive living costs for students, software developers may take note as they look to relocate.
Reading furnishes the mind only with materials of knowledge; it is thinking that makes what we read ours. ~ John Locke
other Learning Options
Software developers near Austin have ample opportunities to meet like minded techie individuals, collaborate and expend their career choices by participating in Meet-Up Groups. The following is a list of Technology Groups in the area.
Fortune 500 and 1000 companies in Texas that offer opportunities for .NET developers
Company Name City Industry Secondary Industry
Dr Pepper Snapple Group Plano Manufacturing Nonalcoholic Beverages
Western Refining, Inc. El Paso Energy and Utilities Gasoline and Oil Refineries
Frontier Oil Corporation Dallas Manufacturing Chemicals and Petrochemicals
ConocoPhillips Houston Energy and Utilities Gasoline and Oil Refineries
Dell Inc Round Rock Computers and Electronics Computers, Parts and Repair
Enbridge Energy Partners, L.P. Houston Transportation and Storage Transportation & Storage Other
GameStop Corp. Grapevine Retail Retail Other
Fluor Corporation Irving Business Services Management Consulting
Kimberly-Clark Corporation Irving Manufacturing Paper and Paper Products
Exxon Mobil Corporation Irving Energy and Utilities Gasoline and Oil Refineries
Plains All American Pipeline, L.P. Houston Energy and Utilities Gasoline and Oil Refineries
Cameron International Corporation Houston Energy and Utilities Energy and Utilities Other
Celanese Corporation Irving Manufacturing Chemicals and Petrochemicals
HollyFrontier Corporation Dallas Energy and Utilities Gasoline and Oil Refineries
Kinder Morgan, Inc. Houston Energy and Utilities Gas and Electric Utilities
Marathon Oil Corporation Houston Energy and Utilities Gasoline and Oil Refineries
United Services Automobile Association San Antonio Financial Services Personal Financial Planning and Private Banking
J. C. Penney Company, Inc. Plano Retail Department Stores
Energy Transfer Partners, L.P. Dallas Energy and Utilities Energy and Utilities Other
Atmos Energy Corporation Dallas Energy and Utilities Alternative Energy Sources
National Oilwell Varco Inc. Houston Manufacturing Manufacturing Other
Tesoro Corporation San Antonio Manufacturing Chemicals and Petrochemicals
Halliburton Company Houston Energy and Utilities Energy and Utilities Other
Flowserve Corporation Irving Manufacturing Tools, Hardware and Light Machinery
Commercial Metals Company Irving Manufacturing Metals Manufacturing
EOG Resources, Inc. Houston Energy and Utilities Gasoline and Oil Refineries
Whole Foods Market, Inc. Austin Retail Grocery and Specialty Food Stores
Waste Management, Inc. Houston Energy and Utilities Waste Management and Recycling
CenterPoint Energy, Inc. Houston Energy and Utilities Gas and Electric Utilities
Valero Energy Corporation San Antonio Manufacturing Chemicals and Petrochemicals
FMC Technologies, Inc. Houston Energy and Utilities Alternative Energy Sources
Calpine Corporation Houston Energy and Utilities Gas and Electric Utilities
Texas Instruments Incorporated Dallas Computers and Electronics Semiconductor and Microchip Manufacturing
SYSCO Corporation Houston Wholesale and Distribution Grocery and Food Wholesalers
BNSF Railway Company Fort Worth Transportation and Storage Freight Hauling (Rail and Truck)
Affiliated Computer Services, Incorporated (ACS), a Xerox Company Dallas Software and Internet E-commerce and Internet Businesses
Tenet Healthcare Corporation Dallas Healthcare, Pharmaceuticals and Biotech Hospitals
XTO Energy Inc. Fort Worth Energy and Utilities Gasoline and Oil Refineries
Group 1 Automotive Houston Retail Automobile Dealers
ATandT Dallas Telecommunications Telephone Service Providers and Carriers
Anadarko Petroleum Corporation Spring Energy and Utilities Gasoline and Oil Refineries
Apache Corporation Houston Energy and Utilities Gasoline and Oil Refineries
Dean Foods Company Dallas Manufacturing Food and Dairy Product Manufacturing and Packaging
American Airlines Fort Worth Travel, Recreation and Leisure Passenger Airlines
Baker Hughes Incorporated Houston Energy and Utilities Gasoline and Oil Refineries
Continental Airlines, Inc. Houston Travel, Recreation and Leisure Passenger Airlines
RadioShack Corporation Fort Worth Computers and Electronics Consumer Electronics, Parts and Repair
KBR, Inc. Houston Government International Bodies and Organizations
Spectra Energy Partners, L.P. Houston Energy and Utilities Gas and Electric Utilities
Energy Future Holdings Dallas Energy and Utilities Energy and Utilities Other
Southwest Airlines Corporation Dallas Transportation and Storage Air Couriers and Cargo Services

training details locations, tags and why hsg

the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations in Texas since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about .NET programming
  • Get your questions answered by easy to follow, organized .NET experts
  • Get up to speed with vital .NET programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Austin, Texas .NET Training , Austin, Texas .NET Training Classes, Austin, Texas .NET Training Courses, Austin, Texas .NET Training Course, Austin, Texas .NET Training Seminar

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.