XML Training Classes in Training/Buffalo,

Learn XML in Training/Buffalo and surrounding areas via our hands-on, expert led courses. All of our classes either are offered on an onsite, online or public instructor led basis. Here is a list of our current XML related training offerings in Training/Buffalo: XML Training

We offer private customized training for groups of 3 or more attendees.

XML Training Catalog

cost: $ 790length: 2 day(s)
In this two-day course students will learn advanced features of XML. Through lecture and hands-on lab exercises, they will extend their capabilities in XML Schema, XPath, and XSLT. In addition, new topics such as XQuery and features of XSLT 2.0 will be discussed ...
cost: $ 1750length: 3 day(s)
This course provides a complete introduction to XML and the Java XML APIs. The course is a balanced mixture of theory and practical labs, designed to take students from the basic fundamentals of XML, right through to mastery of the standard Java XML APIs. The students are walked through the different standards in a structured manner, to enable them to master the concepts and ideas, which are ...
cost: $ 1290length: 3 day(s)
This course is an intensive, hands-on introduction to XML, XPath, and XSLT. The course is a balanced mixture of theory and practical labs designed to take students from the basic fundamentals of XML right through to the advanced XML technologies. The students are walked through the different standards in a structured manner to enable them to master the concepts and ideas, which are reinforced ...
cost: $ 1190length: 3 day(s)
In this three-day course students will learn how to create well-formed XML documents. In addition, they will learn about the most important supplementary technologies that support XML, including DTDs and XML Schema for validation as well as XSLT for transformation. ...
cost: $ 1190length: 3 day(s)
This fast-paced course teaches the features built into Visual Studio .NET for creating and maintaining XML in applications, as well as integrating XML into distributed applications. The course covers: XML standards implemented in the .NET Framework, including the core XML specification, XSLT, and XML schema; the different ways that .NET parses XML data; writing applications that read XML, create ...
cost: $ 1750length: 5 day(s)
This comprehensive course provides a full tour of the most prevalent XML standards, and introductory-to-intermediate training in each: XML itself, XML Schema, XSLT, and XSLFO. This is a great fit for students who are planning to work extensively with XML in the near future, as it gives a good grounding in how to manage XML information, define XML models (using XML Schema), transform XML ...
cost: $ 790length: 2 day(s)
This two-day course teaches the different types of XML parsing available in .NET. The course starts off with an overview of the .NET Framework and XML classes found in the System namespace. It then dives into the different parsing methodologies available from Microsoft and gives an overview of XML technologies in the .NET Framework. Upon completion, students will be fluent in the .NET System.Xml ...
cost: $ 1590length: 4 day(s)
The course includes extensive programming examples, a progressively developed case study, and several tools for manipulating XML documents. All source code is in C# and is provided with the course. The main lab track uses console and Windows Forms client programs, and an optional Web lab track is available that provides ASP.NET client programs. ...
cost: $ 1750length: 3 day(s)
In this course, Java programmers will learn the basics of XML form and syntax. They will use Java to implement XML web applications, as well as learning how to use XML to pass data between distributed Java applications. Emphasis is placed on writing well-formed and valid XML, parsing techniques and converting Legacy data with XML. ...
cost: $ 790length: 2 day(s)
This course gives the student who knows the fundamentals of XML a detailed introduction to the XML Schema standard for defining document type information. The first module introduces the new XML Schema recommendation. Students review the shortcomings of the DTD for expressing type information, and learn how to use XML Schema to create strict document models. Schema data types and structures are ...
cost: $ 390length: 1 day(s)
This course introduces the eXtensible Stylesheet Language, or XSL - also known as XSL with Formatting Objects or XSLFO, to distinguish it clearly from XSLT. XSLFO provides the ultimate, standards-based solution to producing print and other presentation documents from XML information. This course teaches XSL with a focus on producing PDFs, using Apache FOP as the formatting engine. Though XSL is ...
cost: $ 790length: 2 day(s)
In this two-day course you will use the features of XSLT and XPath to develop stylesheets that convert XML documents to other XML, HTML, or text. The course begins with an introduction to commonly used tags such as template, apply-templates, and value-of. From there, you will learn how to use XPath nodetypes, axes, and predicates. Flow control and functions are covered next. Finally, you will ...

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Blog Entries publications that: entertain, make you think, offer insight

Memory management is always a priority in pretty much any programming language you would want to use. In the lower level languages such as C, there are a number of functions which help you manage the memory your application uses, but they are not the easiest to use. Some of the more modern programming languages such as Python, Ruby, Perl, and of course the subject of this article, Javascript all have a built in feature called garbage collection.

 

Garbage collection essentially means that the languages compiler will automatically free the memory being occupied by unused variables and objects, but there is no telling when this could occur. It is purely down to the compiler to decide when the garbage collection process should be initiated.

 

We’re often asked by companies about how they can get the most value from Agile/Scrum practices. More specifically, they want to know if they are being as effective as best they possibly can be by using the Scrum framework for their explicit needs.

The other objective for individuals is determining if it necessary to be certified in order to be effective in the Agile Scrum world?   In short, a good Scrum Master must understand four things: the business they work in, the technology they work with, the Agile and Scrum principles, and, most importantly, people!  Based on these facts, Scrum Master Certification is not enough – real life experience and a bit of soft skills should be part and parcel of their training. For organizations, the main goal is to understand industry best practices when adopting and applying agile principles, to build strong teams, understand and distill business needs into software requirements.

In terms of getting a good grip on training for Agile/Scrum, one can opt to pursue a certification in Scrum (CSM) Certified Scrum Master for personal reasons or for a job requirement. Or, one can simply opt to learn the benefits and pitfalls of the methodology and decide the best approach for them.

There are different ways to get started with Agile training. Below are two of the most common paths to Agile our students take.

 
One of the biggest threats facing small businesses right now is cyber security. Hackers have figured out that small business don’t have robust systems; therefore, they are easy for the picking. If you are a small business owner, you know how limited your resources are. As such, every dollar counts. Therefore, you can’t afford to lose customers, deal with lawsuits caused by data breaches or pay IT help staff to try to fix the issue. Below are some of the IT risks faced by your business and potential consequences. Try your best avoid them at all costs. 
 
1. Phishing 
 
This is perhaps one of the easiest ways to detect if a hacker is trying to get into your system. If you happen to receive an email that claims to be from a financial institution and asks you to provide certain data, ignore it. In fact, delete it. This is because once you make the mistake of opening such a mail or clicking the link provided, you provide a gateway for hackers to penetrate your system and steal information. For this reason, it's vital that all employees  are aware of such emails and delete them without clicking on any links.
 
2. Passwords 
 
Another way that hackers can attack a small business is by cracking system passwords. If the hackers manage to crack the password of even a single employee, they can use that person’s account to gain unrestricted access to confidential company records. Therefore, tell your workers that they should never forgo strong password creation procedures. They should take their time to create a password that can’t be easily cracked. 
 
3. Vulnerable Devices 
 
In your small business, you probably use printers, routers, and other electronic hardware to execute office tasks. Most of the time, such pieces of hardware are connected to your firm’s network. If you have not updated the software on these machines, hackers can use them to gain access to your network and steal invaluable information. Therefore, make sure that you install patches in all electronic devices connected to your network. 
 
4. Lack of Data Encryption 
 
In the modern age, you can send information through various electronic devices. Some of those machines can have inbuilt security features to protect the data while others may not have. Data from the vulnerable devices can be easily intercepted by hackers. If the information is your password, your network is no longer safe. To counter such interceptions, always encrypt your data before your send it. 
 
5. Seemingly Misplaced USB Drives 
 
Some hackers will infect a USB drive with malware and then drop it outside your offices. An unknowing worker may pick up the drive and use it on a company computer. Immediately the drive is plugged in, it releases the malware and creates a unique access point for the hacker, allowing them to steal information. To avoid such a scenario, warn your employees against using any USB drives without a proper source. 
 
 
Managing a small business means that you’re a lean, mean business machine. Often, it’s just you and a few trusted staff members. This is the reason, business owners need to have solid knowledge of where and how most important data is held. Whether it’s on site, in traditional desktops and servers, or in cloud services or mobile devices including those "BYOD" devices of your employees, in order to avoid risks, always pay attention to your enviroment. It's important to make sure that you regularly update your system, train your employees, update software and fix bugs. Often, many IT issues are caused by the smallest, almost unapparent mistakes that will affect how a program runs or a web page looks. You might not see IT as your highest priority, but in the right hands, it can become your most powerful tool for growth. 

From Brennan's Blog which is no longer up and running:

I use Remote Desktop all the time to work inside of my development systems hosted by Microsoft Virtual Server. I use the host system to browse the web for documentation and searches as I work and when I need to copy some text from the web browser I find many times the link between the host clipboard and the remote clipboard is broken. In the past I have read that somehow the remote clipboard utility, rdpclip.exe, gets locked and no longer allows the clipboard to be relayed between the host and the client environment. My only way to deal with it was to use the internet clipboard, cl1p.net. I would create my own space and use it to send content between environments. But that is a cumbersome step if you are doing it frequently.

The only way I really knew to fix the clipboard transfer was to close my session and restart it. That meant closing the tools I was using like Visual Studio, Management Studio and the other ancillary processes I have running as I work and then restarting all of it just to restore the clipboard. But today I found a good link on the Terminal Services Blog explaining that what is really happening. The clipboard viewer chain is somehow becoming unresponsive on the local or remote system and events on the clipboards are not being relayed between systems. It is not necessarily a lock being put in place but some sort of failed data transmission. It then goes on to explain the 2 steps you can take to restore the clipboard without restarting your session.

  • Use Task Manager to kill the rdpclip.exe process
  • Run rdpclip.exe to restart it

The clipboard communications should be restored. My clipboard is currently working because I just restarted my session to fix it, but I wanted to test these steps. I killed rdpclip.exe and started it and was able to copy/paste from the remote to the host system. The next time my clipboard dies I will have to check to see if these steps truly do work.

training details locations, tags and why hsg

the hartmann software group advantage
A successful career as a software developer or other IT professional requires a solid understanding of software development processes, design patterns, enterprise application architectures, web services, security, networking and much more. The progression from novice to expert can be a daunting endeavor; this is especially true when traversing the learning curve without expert guidance. A common experience is that too much time and money is wasted on a career plan or application due to misinformation.

The Hartmann Software Group understands these issues and addresses them and others during any training engagement. Although no IT educational institution can guarantee career or application development success, HSG can get you closer to your goals at a far faster rate than self paced learning and, arguably, than the competition. Here are the reasons why we are so successful at teaching:

  • Learn from the experts.
    1. We have provided software development and other IT related training to many major corporations since 2002.
    2. Our educators have years of consulting and training experience; moreover, we require each trainer to have cross-discipline expertise i.e. be Java and .NET experts so that you get a broad understanding of how industry wide experts work and think.
  • Discover tips and tricks about XML programming
  • Get your questions answered by easy to follow, organized XML experts
  • Get up to speed with vital XML programming tools
  • Save on travel expenses by learning right from your desk or home office. Enroll in an online instructor led class. Nearly all of our classes are offered in this way.
  • Prepare to hit the ground running for a new job or a new position
  • See the big picture and have the instructor fill in the gaps
  • We teach with sophisticated learning tools and provide excellent supporting course material
  • Books and course material are provided in advance
  • Get a book of your choice from the HSG Store as a gift from us when you register for a class
  • Gain a lot of practical skills in a short amount of time
  • We teach what we know…software
  • We care…
learn more
page tags
what brought you to visit us
Training/Buffalo,  XML Training , Training/Buffalo,  XML Training Classes, Training/Buffalo,  XML Training Courses, Training/Buffalo,  XML Training Course, Training/Buffalo,  XML Training Seminar

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.