Want to hire a development team?
Search Filter
Search Filter
Sort Listings By
Show Only
By Customer Review
Licence Type
By Technology

New Scripts | Java | Tutorials & Tips

Results 141-160 of 301
Generate Certificate Chains for Testing Java Applications
Learn how to create digital-certificate chains to test your software. IBM Software Engineer, Paul H. Abbott, clarifies this seldom-documented process by showing you how to use the freely available OpenSSL toolkit to create a certificate chain of any length. He also describes common certificate attributes and shows you some sample Java code for reading the certificates you create into a Java keystore.
(0 ratings)
Reviews0
PriceFree
Views1220
Introducing the Reflexive User Interface Builder
The IBM Reflexive User Interface Builder (RIB), a new technology available from alphaWorks, is an application and toolkit for building and rendering Java AWT/Swing and Eclipse SWT GUIs. RIB specifies a flexible and easy-to-use XML markup language for describing Java GUIs and provides an engine for creating them. You can use RIB to test and evaluate basic GUI layout and functionality, or to create and render GUIs for an application.
(0 ratings)
Reviews0
PriceFree
Views1915
Use the Element Construction Set to create formatted logs
The Jakarta Element Construction Set (ECS) is an open source project for creating markup language documents using the Java language and an object-oriented approach. Java developer Amit Tuli provides an introduction to ECS and shows you a step-by-step approach for using it to generate well-formatted status reports from log files. You will create a sample application to help you better understand ECS and its usage. You'll also learn some other potential uses for the API.
(0 ratings)
Reviews0
PriceFree
Views1194
Introduction to Jena
RDF is increasingly recognized as an excellent choice for representing and processing semi-structured data. In this article, Web developer Philip McCarthy shows you how to use the Jena Semantic Web Toolkit to exploit RDF data models in your Java applications.
(0 ratings)
Reviews0
PriceFree
Views1419
Mobile Database Access
This tutorial shows you how to build a database application using Java 2 Micro Edition (J2ME) Record Management System (RMS). It also demonstrates how to craft a MIDlet that performs the necessary logic of creating and accessing a sample database application and deploys it to a J2ME environment.
(18 ratings)
Reviews0
PriceFree
Views2525
Data Management in J2EE Apps
This article examines two data management strategies available on the Java platform: Java object serialization and Java Database Connectivity (JDBC). While neither data management strategy is inherently superior or inferior to the other, when it comes to managing enterprise information systems, JDBC wins hands down.
(0 ratings)
Reviews0
PriceFree
Views1058
J2ME application development on the 6600
posted byradinksinWAP & WML
A discussion of MIDlet development on the Nokia 6600 making use of the MIDP 2.0 and MMAPI. The artcile will attempt to guides you through many of the quirks of this phone, not least of which is the 'Mickey Mouse' effect of the audio capture tool.
(3 ratings)
Reviews0
PriceFree
Views1200
Application Privacy Monitoring for JDBC
Privacy monitoring technology in information technology systems is now necessary in order to ensure compliance with stated privacy policies, especially in the customer information management systems in enterprises such as Customer Relationship Management (CRM). Privacy policies allow organizations to control the use of personally identifiable information (PII) according to individual choices. The IBM Tivoli Privacy Manager (TPM) provides server support for creating, deploying, and administering privacy policies as well as for checking conformance to policies and for logging auditable data on data accesses. However, applications using TPM must use an agent that is able to intercept each access of PII and interact with a TPM server for auditing and enforcement. This is the function of a privacy monitor.
(0 ratings)
Reviews0
PriceFree
Views1051
Reference Monitor for Tivoli Privacy Manager
The Reference Monitor's purpose is to simplify the task of developing new privacy monitors, which are integration points between an application and the Privacy Manager server. IBM Tivoli Privacy Manager provides a way for businesses to meet various privacy regulations. It incorporates a privacy management middleware system that applies privacy rules to existing applications while minimizing the impact to the environment.
(0 ratings)
Reviews0
PriceFree
Views979
XmlEncode
This is a simple function used to encode text and attribute values before adding them to your XML documents. This code can always be extended to handle maore special characters
(6 ratings)
Reviews0
PriceFree
Views2608
Java 2 Platform and JAAS Authorization Architectures
Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the user-centric model of the Java Authentication and Authorization Service.
(0 ratings)
Reviews0
PriceFree
Views1311
Unclogging Server Bottlenecks w/ Active Containers
In server-side control architectures a majority of the control events must be handled on the server side to update the state of the control. For every user event, the entire page data is sent back to the server as part of the form submission, even data that has not changed or is not affected by the user event. This article shows you how to use containers to overcome data-processing redundancy, which can otherwise drain the life out of your handheld or Web server.
(0 ratings)
Reviews0
PriceFree
Views1028
Structural Analysis for Java
SA4J is a technology that analyzes structural dependencies of Java applications in order to measure their stability. It detects structural "anti-patterns" (suspicious design elements) and provides dependency web browsing for detailed exploration of anti-patterns in the dependency web. SA4J also enables "what if" analysis in order to assess the impact of change on the functionality of the application; and it offers guidelines for package re-factoring.
(0 ratings)
Reviews0
PriceFree
Views1287
Tracing in a Multithreaded, Multiplatform Environment
Most Java programmers use some kind of tracing system to keep track of potential errors and problems in code under development. However, multithreaded and multiplatform systems can generate a large and baffling amount of tracing data. This article offers tips that will help you make sense of trace data from complex applications.
(102 ratings)
Reviews0
PriceFree
Views1060
Google on your WAP phone using Java Server Pages
posted byfaisalinNetworking
Code example to demonstrate how to access Google on your WAP phone using JSP pages.
(0 ratings)
Reviews0
PriceFree
Views1336
Stop Email Spam with Java Applets
This article explains all the Java code required to send emails using Java applets, thus hiding/protecting your real email addresses.
(0 ratings)
Reviews0
PriceFree
Views1746
Using Aspect-Oriented Programming to Maintain Legacy Java Apps
In an enterprise environment, you can easily end up in a tangle of modules with a number of third-party libraries and frameworks. While a number of tools are available to aid you in comprehending complex programs, most are expensive and time-consuming to learn. Aspect-oriented programming can be applied to a wide range of programming scenarios, including the comprehension and maintenance of legacy applications.
(0 ratings)
Reviews0
PriceFree
Views1038
JSP Form Action Page
Most forms today store the user input into a database, but while there are many examples of building form pages or form action pages that echo or mail the input, I couldn't find a lot of examples of form action pages that store input into a database. This flash movie is for beginning JSP developer and attempts to explain the basic concepts involved in capturing and storing user input, a process that will be used in nearly every page you develop.
(6 ratings)
Reviews0
PriceFree
Views3559
Out of the Sandbox
Get your applet out of the sandbox. This guide takes you through the steps involved in creating digitally signed applets. These trusted applets can overcome the restrictions placed by the sandbox such accessing local files and folders.
(3 ratings)
Reviews0
PriceFree
Views1917
Counting Records in MySQL by JSP
This code source displays count of records in MySQL. We are using a SQL statement. You can easily modify the code to use in different languages. But this code can be used for JSP with MySQL. We will use Connector/J driver to connect database.
(10 ratings)
Reviews1
PriceFree
Views2938
Results 141-160 of 301