CompTIA Training Classes in Bridgeport, Connecticut

Learn CompTIA in Bridgeport, Connecticut and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current CompTIA related training offerings in Bridgeport, Connecticut: CompTIA Training

We offer private customized training for groups of 3 or more attendees.

CompTIA Training Catalog

cost: $ 970length: 2 day(s)
cost: $ 1670length: 2 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 1690length: 3 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)
cost: $ 2090length: 5 day(s)

Cloud Classes

cost: $ 1090length: 2 day(s)
cost: $ 1090length: 2 day(s)

Linux Unix Classes

cost: $ 2090length: 5 day(s)

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

 

I suspect that many of you are familiar with the term "hard coding a value" whereby the age of an individual or their location is written into the condition (or action) of a business rule (in this case) as shown below:

if customer.age > 21 and customer.city == 'denver'

then ...

Such coding practices are perfectly expectable provided that the conditional values, age and city, never change. They become entirely unacceptable if a need for different values could be anticipated. A classic example of where this practice occurred that caused considerable heartache in the IT industry was the Y2K issue where dates were updated using only the last 2 digits of a four digit number because the first 2 digits were hard-coded to 19 i.e. 1998, 1999. All was well provided that the date did not advance to a time beyond the 1900’s since no one could be certain of what would happen when the millennia arrived (2000). A considerably amount of work (albeit boring) and money, approximately $200 billion, went into revising systems by way of software rewrites and computer chip replacements in order to thwart any detrimental outcomes. It is obvious how a simple change or an assumption can have sweeping consequences.

You may wonder what Y2K has to do with Business Rule Management Systems (BRMS). Well, what if we considered rules themselves to be hard-coded. If we were to write 100s of rules in Java, .NET or whatever language that only worked for a given scenario or assumption, would that not constitute hard-coded logic? By hard-coded, we obviously mean compiled. For example, if a credit card company has a variety of bonus campaigns, each with their own unique list of rules that may change within a week’s time, what would be the most effective way of writing software to deal with these responsibilities?

Information Technology (IT) tools are here to support your business in the global market. Effective communication is key for IT and business experts to collaborate effectively in search of solutions. Consulting, reaching out for help to a third-party, can bridge the gap between your business marketing experts and IT operations experts, especially with the emergence of big data analytics and its implication on the global market. Having the right consultants equipped with business knowledge and data technology expertise can make a difference.

Your marketing organization is probably familiar with digital tools and conducting global research. Its results can uncover the journey customers take to purchase your products or use your services. It can highlight the pain points and frictions that prevent their experiences with you to be delightful and amazing. Armed with this knowledge and beautiful compelling presentations, marketing executives expect that IT operations leaders will translate these insights into actions.

But people in IT operations are too involved in meeting key performance indicators that have nothing to do with the end customers. Meeting requirements of faster and cheaper don't translate very well into customer satisfaction. A classic breakdown in communication is described in a Harvard Business Review article, “A Technique to Bridge the Gap Between Marketing and IT.” The author goes on to describe how a new CIO at a bank found IT to be focused on the internal organization as their customers, rather than the real end customer. Moreover, no one was looking at the incident reports which clearly showed that incidents were increasing. And nobody looked at what these incidents were doing to the bank’s customers. The startling and scary numbers of incidents were caught and addressed and brought down from 1,000 to 600 or (40%) and later to 450 per week.

Surprisingly, these type of seemingly isolated scenarios are still being discovered within organizations presently, sometimes internally, and through third party insights such as consultants.  By engaging consultants to provide a perspective based on what they’ve experienced before, they can often bring new and innovative ideas or possible challenges to the table that an internal processes probably wouldn’t have been able to see on their own.  Often, third party input can help to provide the translation needed to go from marketing research results into actions that IT operations can understand and make sense in their high-performance culture. When companies understand and use this knowledge to reassess how to improve their customer experiences, they work backward from what customers want to achieve significantly higher improvements. 

IT and business management are more and more being asked to move away from their traditional roles, such as IT being the "technology infrastructure gatekeeper", and instead become enablers across the enterprise of effective collaboration, big data consumers, and key players in driving desired business outcomes. Marketing leaders look to technology as a way to facilitate the customer's journey and his positive experience of it, bring more clients, and meet increasingly higher loyalty goals. They rely on IT projects to enable big data-based behavioral targeting anywhere in the global market. This means projects to analyze search engine results, improve website personalization and optimization, and building of mobile applications for a more personal experience. All these are projects that consultants with their communication, consulting and technical expertise are well prepared to help in order to bridge the expectation gap between IT and other business organizations.

In order to meet these 21st-century business challenges, Information Technology organizations have been transitioning from waterfall stage-gate project management approaches to agile development. The stage-gate method applies a step-by-step approach where waiting, reviewing and approving are required before moving to the next step in the project. Agile management emphasizes collaboration, no decision hierarchies, and few people roles for making quick, customer-focused small changes over time to deliver solutions that delight and amaze customers. Agile development has allowed many businesses to respond quickly to changing customer desires and expectations. But moving to continuous delivery is a struggle requiring focused, dedicated teams that are not well suited to the traditional matrix organization where people are resources whose time must be "chopped" into many pieces and shared among many projects. Agile teams meet frequently as often as daily but never waiting more than a week to do so.

Marketing people are externally focused. IT people are internally focused. The first works with customer emotions. The second works to increase efficiency. Big data analytic tools are used by the first and supported by the second. Consultants can be the glue that helps both come together in effective collaborations that deliver positive business outcomes in both global and local markets.

In programming, memory leaks are a common issue, and it occurs when a computer uses memory but does not give it back to the operating system. Experienced programmers have the ability to diagnose a leak based on the symptoms. Some believe every undesired increase in memory usage is a memory leak, but this is not an accurate representation of a leak. Certain leaks only run for a short time and are virtually undetectable.

Memory Leak Consequences

Applications that suffer severe memory leaks will eventually exceed the memory resulting in a severe slowdown or a termination of the application.

How to Protect Code from Memory Leaks?

Preventing memory leaks in the first place is more convenient than trying to locate the leak later. To do this, you can use defensive programming techniques such as smart pointers for C++.  A smart pointer is safer than a raw pointer because it provides augmented behavior that raw pointers do not have. This includes garbage collection and checking for nulls.

If you are going to use a raw pointer, avoid operations that are dangerous for specific contexts. This means pointer arithmetic and pointer copying. Smart pointers use a reference count for the object being referred to. Once the reference count reaches zero, the excess goes into garbage collection. The most commonly used smart pointer is shared_ptr from the TR1 extensions of the C++ standard library.

Static Analysis

The second approach to memory leaks is referred to as static analysis and attempts to detect errors in your source-code. CodeSonar is one of the effective tools for detection. It provides checkers for the Power of Ten coding rules, and it is especially competent at procedural analysis. However, some might find it lagging for bigger code bases.

How to Handle a Memory Leak

For some memory leaks, the only solution is to read through the code to find and correct the error. Another one of the common approaches to C++ is to use RAII, which an acronym for Resource Acquisition Is Initialization. This approach means associating scoped objects using the acquired resources, which automatically releases the resources when the objects are no longer within scope. RAII has the advantage of knowing when objects exist and when they do not. This gives it a distinct advantage over garbage collection. Regardless, RAII is not always recommended because some situations require ordinary pointers to manage raw memory and increase performance. Use it with caution.

The Most Serious Leaks

Urgency of a leak depends on the situation, and where the leak has occurred in the operating system. Additionally, it becomes more urgent if the leak occurs where the memory is limited such as in embedded systems and portable devices.

To protect code from memory leaks, people have to stay vigilant and avoid codes that could result in a leak. Memory leaks continue until someone turns the system off, which makes the memory available again, but the slow process of a leak can eventually prejudice a machine that normally runs correctly.

 

Related:

The Five Principles of Performance

In Demand IT Skills

data dictionary workThe mainstay of a corporation is the data that it possesses. By data, I mean its customer base, information about the use of its products, employee roles and responsibilities, the development and maintenance of its product lines, demographics of supporters and naysayers, financial records, projected sales ... It is in the organization of this data that advancements to the bottom line are often realized i.e. the nuggets of gold are found. Defining what is important, properly cataloging the information, developing a comprehensive protocol to access and update this information and discerning how this data fits into the corporate venacular is basis of this data organization and may be the difference between moving ahead of the competition or being the one to fall behind.

Whenever we attempt to develop an Enterprise Rule Application, we must begin by harvesting the data upon which those rules are built. This is by no means an easy feat as it requires a thorough understanding of the business, industry, the players and their respective roles and the intent of the application. Depending upon the scope of this undertaking, it is almost always safe to say that no one individual is completely knowledgeable to all facets needed to comprise the entire application.data dictionary

The intial stage of this endeavor is, obviously, to decide upon the intent of the application. This requires knowledge of what is essential, what is an add-on and which of all these requirements/options can be successfully implemented in the allotted period of time. The importance of this stage cannot be stressed enough; if the vision/goal cannot be articulated in a manner that all can understand, the knowledge tap will be opened to become the money drain. Different departments may compete for the same financial resources; management may be jockeying for their day in the sun; consulting corporations, eager to win the bid, may exaggerate their level of competency. These types of endeavors require those special skills of an individual or a team of very competent members to be/have a software architect, subject matter expert and business analyst.

Once the decision has been made and the application development stages have been defined, the next step is to determine which software development tools to employ. For the sake of this article, we will assume that the team has chosen an object oriented language such as Java and a variety of J EE components, a relationsional database and a vendor specific BRMS such as Blaze Advisor. Now, onto the point of this article.

Tech Life in Connecticut

Software developers in Hartford, Fairfield, New Haven, Greenwich and New Britain are rich in Fortune 1000 companies such as the Xerox Corporation, CIGNA, Aetna, and United Technologies Corporation just to name a few. A fun fact: Hartford has the oldest U.S. newspaper still being published?the Hartford Courant, established 1764. Connecticut is also the insurance capital of the nation.
That is what learning is. You suddenly understand something you've understood all your life, but in a new way. Doris Lessing
other Learning Options
Software developers near Bridgeport have ample opportunities to meet like minded techie individuals, collaborate and expend their career choices by participating in Meet-Up Groups. The following is a list of Technology Groups in the area.
Fortune 500 and 1000 companies in Connecticut that offer opportunities for CompTIA developers
Company Name City Industry Secondary Industry
Stanley Black and Decker, Inc. New Britain Manufacturing Tools, Hardware and Light Machinery
EMCOR Group, Inc. Norwalk Energy and Utilities Energy and Utilities Other
The Hartford Financial Services Group Inc. Hartford Financial Services Insurance and Risk Management
Crane Co. Stamford Manufacturing Tools, Hardware and Light Machinery
Cenveo. Inc. Stamford Business Services Business Services Other
Amphenol Corporation Wallingford Computers and Electronics Semiconductor and Microchip Manufacturing
W. R. Berkley Corporation Greenwich Financial Services Insurance and Risk Management
Silgan Holdings Inc. Stamford Manufacturing Manufacturing Other
Hubbell Incorporated Shelton Manufacturing Concrete, Glass, and Building Materials
IMS Health Incorporated Danbury Business Services Management Consulting
CIGNA Corporation Hartford Financial Services Insurance and Risk Management
Chemtura Corp. Middlebury Manufacturing Chemicals and Petrochemicals
Harman International Industries, Inc Stamford Computers and Electronics Audio, Video and Photography
United Rentals, Inc. Greenwich Real Estate and Construction Construction Equipment and Supplies
The Phoenix Companies, Inc. Hartford Financial Services Investment Banking and Venture Capital
Magellan Health Services, Inc. Avon Healthcare, Pharmaceuticals and Biotech Healthcare, Pharmaceuticals, and Biotech Other
Terex Corporation Westport Manufacturing Heavy Machinery
Praxair, Inc. Danbury Manufacturing Chemicals and Petrochemicals
Knights of Columbus New Haven Non-Profit Social and Membership Organizations
Xerox Corporation Norwalk Computers and Electronics Office Machinery and Equipment
Starwood Hotels and Resorts Worldwide, Inc. Stamford Travel, Recreation and Leisure Hotels, Motels and Lodging
United Technologies Corporation Hartford Manufacturing Aerospace and Defense
General Electric Company Fairfield Computers and Electronics Consumer Electronics, Parts and Repair
Pitney Bowes, Inc. Stamford Manufacturing Tools, Hardware and Light Machinery
Charter Communications, Inc. Stamford Telecommunications Cable Television Providers
Aetna Inc. Hartford Financial Services Insurance and Risk Management
Priceline.com Norwalk Travel, Recreation and Leisure Travel, Recreation, and Leisure Other

training details locations, tags and why hsg

the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations in Connecticut since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about CompTIA programming
  • Get your questions answered by easy to follow, organized CompTIA experts
  • Get up to speed with vital CompTIA programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Bridgeport, Connecticut CompTIA Training , Bridgeport, Connecticut CompTIA Training Classes, Bridgeport, Connecticut CompTIA Training Courses, Bridgeport, Connecticut CompTIA Training Course, Bridgeport, Connecticut CompTIA Training Seminar
training locations
Connecticut cities where we offer CompTIA Training Classes

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.