Top Rated Scripts | Java | Tutorials & Tips
Accessing EJBs through firewalls
posted byanand_sankaraninEJB
Ever try to write a J2EE application accessing EJBs across a firewall? It can be messy, and developers often must resort to all kinds of workarounds, none of them particularly "neat." Developers often write a servlet to intercept HTTP requests and delegate them to EJBs, which is kind of a kludge. Another approach that uses tunneling technologies-such as RMI over HTTP-can entail a big performance hit. But there is a better way. You can solve this problem elegantly by using Java Secure Socket Extension (JSSE).
Reviews0
PriceFree
Views2308
Data Wizard for Java
posted byvoltroninMiscellaneous
Data Wizard for Java is a tool for building a simple graphical user interface (GUI) that makes it easy to collect necessary data. This tool enables the building of data wizard applications using only a scripting scenario in an XML format. Data Wizard for Java can help to produce a GUI by using a simple script to describe the necessary input parameters and the required tools or utilities to be called.
Reviews0
PriceFree
Views1824
Web Services for DB2 Cube Views
posted byvoltroninMiscellaneous
Web Services for DB2 Cube Views provide access to multidimensional data stored in DB2. These Web services allow a client application to read data from the cubes and perform basic online analysis on multidimensional data and metadata through the Web, using XPath and XML.
Reviews0
PriceFree
Views1541
Tip: Set up SAX Parsers
posted byvoltroninXML & Java
This is the first in a series of tips that will serve as a comprehensive guide to using XML from the Java programming language. I begin with coverage of the SAX API. This tipreviews getting an instance of a SAX parser and setting various features and properties on that parser.
Reviews0
PriceFree
Views2318
Demystifying Extreme Programming: Just-in-time design
posted byvoltroninDevelopment
People who aren't familiar with XP are bothered by the concept of just-in-time (JIT) design -- designing and implementing what you know you need right now and not worrying about future design issues until absolutely necessary. While this approach might seem unwise or even reckless, XP advocate Roy Miller wraps up his series by showing you how safe and easy JIT design is -- and how it just might revolutionize the way you write code.
Reviews0
PriceFree
Views1344
Scaling Web services and applications with JavaGroups
posted byvoltroninDevelopment
As the J2EE platform has matured, it has opened up the opportunity to deploy commodity servers in networked cluster configurations for scaling of Web services and Web applications at the Web tier. These commodity servers, interconnected through commodity LAN hardware, can provide cost-effective clustering solutions. The last piece of the clustering puzzle is in the software. In this seriesSing Li examines three open source software substrates that can enable high-impact Web tier clustering, beginning with JavaGroups.
Reviews0
PriceFree
Views1306
Build interoperable Web services with JSR-109
posted byvoltroninMiscellaneous
JSR-109 facilitates the building of interoperable Web services in the Java 2 Platform, Enterprise Edition (J2EE) environment. It standardizes the deployment of Web services in a J2EE container. This article discusses the server and client programming models defined by JSR-109 and provides code examples.
Reviews0
PriceFree
Views1367
Jikes Bytecode Toolkit
posted byvoltroninMiscellaneous
Jikes Bytecode Toolkit is a 100% Java class library that enables Java programs to create, read, and write binary Java class files and to query and update a single, high-level representation of the collection of them, including relationships among them. These features allow the development of tools that report on what APIs the classes use, reorder and change instructions, merge or extend classes, add customized instrumentation (similar to profilers), analyze control and data flow, etc.
Reviews0
PriceFree
Views1772
Solution Enabler
posted byvoltroninMiscellaneous
Solution Enabler is a framework for creating and deploying solutions locally or to remote machines with different operating systems. The framework helps to simplify the creation and deployment of software solutions by capturing detailed knowledge of a solution package deployed through a common installer.
Reviews0
PriceFree
Views1913
Application Tools for Extension Services
posted byvoltroninMiscellaneous
Application Tools for Extension Services consist of WebSphere� Studio-based tools that support the development of Web applications targeted for the Extension Services for WebSphere Everyplace (ESWE) platform. These tools are based on the existing WebSphere Studio J2EE development tools and they are part of an emerging suite of tools for the ESWE platform.
Reviews0
PriceFree
Views1445
What is java?
posted byhotscriptsinIntroduction to Java
This small article is aimed at web designers who are (mostly) non-programmers
and who wish to use 3rd party applets rather than create their own. It sets
out to define java from the non-specialist's perspective and guard against a few common misconceptions.
Reviews0
PriceFree
Views1461
Using Aspect-Oriented Programming to Maintain Legacy Java Apps
posted bypowelljgrinDevelopment
In an enterprise environment, you can easily end up in a tangle of modules with a number of third-party libraries and frameworks. While a number of tools are available to aid you in comprehending complex programs, most are expensive and time-consuming to learn. Aspect-oriented programming can be applied to a wide range of programming scenarios, including the comprehension and maintenance of legacy applications.
Reviews0
PriceFree
Views1163
Google on your WAP phone using Java Server Pages
posted byfaisalinNetworking
Code example to demonstrate how to access Google on your WAP phone using JSP pages.
Reviews0
PriceFree
Views1484
Stop Email Spam with Java Applets
posted byfaisalinApplet Building
This article explains all the Java code required to send emails using Java applets, thus hiding/protecting your real email addresses.
Reviews0
PriceFree
Views1974
Structural Analysis for Java
posted byvoltroninMiscellaneous
SA4J is a technology that analyzes structural dependencies of Java applications in order to measure their stability. It detects structural "anti-patterns" (suspicious design elements) and provides dependency web browsing for detailed exploration of anti-patterns in the dependency web. SA4J also enables "what if" analysis in order to assess the impact of change on the functionality of the application; and it offers guidelines for package re-factoring.
Reviews0
PriceFree
Views1401
Unclogging Server Bottlenecks w/ Active Containers
posted bypowelljgrinDevelopment
In server-side control architectures a majority of the control events must be handled on the server side to update the state of the control. For every user event, the entire page data is sent back to the server as part of the form submission, even data that has not changed or is not affected by the user event. This article shows you how to use containers to overcome data-processing redundancy, which can otherwise drain the life out of your handheld or Web server.
Reviews0
PriceFree
Views1162
Java 2 Platform and JAAS Authorization Architectures
Follow along as Java architect Abhijit Belapurkar leads this detailed, behind-the-scenes introduction to two distinctly different (yet related) models of authorization: the code-centric model of the Java 2 platform security architecture and the user-centric model of the Java Authentication and Authorization Service.
Reviews0
PriceFree
Views1454
Application Privacy Monitoring for JDBC
posted byvoltroninMiscellaneous
Privacy monitoring technology in information technology systems is now necessary in order to ensure compliance with stated privacy policies, especially in the customer information management systems in enterprises such as Customer Relationship Management (CRM). Privacy policies allow organizations to control the use of personally identifiable information (PII) according to individual choices. The IBM Tivoli Privacy Manager (TPM) provides server support for creating, deploying, and administering privacy policies as well as for checking conformance to policies and for logging auditable data on data accesses. However, applications using TPM must use an agent that is able to intercept each access of PII and interact with a TPM server for auditing and enforcement. This is the function of a privacy monitor.
Reviews0
PriceFree
Views1165
Reference Monitor for Tivoli Privacy Manager
posted byvoltroninMiscellaneous
The Reference Monitor's purpose is to simplify the task of developing new privacy monitors, which are integration points between an application and the Privacy Manager server. IBM Tivoli Privacy Manager provides a way for businesses to meet various privacy regulations. It incorporates a privacy management middleware system that applies privacy rules to existing applications while minimizing the impact to the environment.
Reviews0
PriceFree
Views1104
Data Management in J2EE Apps
posted bypowelljgrinDevelopment
This article examines two data management strategies available on the Java platform: Java object serialization and Java Database Connectivity (JDBC). While neither data management strategy is inherently superior or inferior to the other, when it comes to managing enterprise information systems, JDBC wins hands down.
Reviews0
PriceFree
Views1198