Similar Articles |
|
JavaWorld July 2000 Todd M. Greanier |
Flatten your objects The Java Serialization API is used by many other Java APIs (like RMI and JavaBeans) to persist objects beyond the duration of a running virtual machine. This article tries to demystify the secrets of the Java Serialization API. |
JavaWorld December 2002 Michael Juntao Yuan |
Data security in mobile Java applications Learn how to select and use third-party security toolkits |
JavaWorld November 2000 M. Jeff Wilson |
Get smart with proxies and RMI RMI enables developers to either get a remote reference to a distributed object, in which all method calls are forwarded to the server object, or get a copy of the remote object and invoke on it locally. You can combine these approaches in a way that is transparent to the client code... |
JavaWorld October 2000 Bruce Eckel |
Everything is an object, Part 2 Eckel takes you through name visibility and using components from other libraries; the static keyword; and comments and embedded documentation. By the end, you should be able to build your first Java program... |
JavaWorld April 2001 Piet Jonas |
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... |
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. |
JavaWorld April 2001 Kelly Davis & Robert Di Marco |
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... |
D-Lib Jul/Aug 2000 Thornton Staples & Ross Wayland |
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. |
JavaWorld August 2002 Guy Gur-Ari |
Empower RMI with TRMI Transparent Remote Method Invocation (TRMI) extends RMI to simplify the creation of distributed applications by allowing centralized RemoteException handling and by allowing any interface to be used remotely. This article tours TRMI's inner workings. |
JavaWorld October 2002 Ray Djajadinata |
Yes, you can secure your Web services documents, Part 2 Introduction to XML Digital Signature, a standard that handles a document's integrity, including how to write XML Signature code using an implementation currently available: IBM XML Security Suite. |
D-Lib June 2005 Jantz & Giarlo |
Digital Preservation: Architecture and Technology for Trusted Digital Repositories To ensure that current digital archives can be trusted to be available in the future, methods, practices, and standards need to be defined. |
D-Lib May 2001 Robert E. Kahn |
Representing Value as Digital Objects A discussion of transferability and anonymity... |
JavaWorld September 2000 Bruce Eckel |
Everything is an object, Part 1 This two-part article, excerpted from Chapter 2 in Thinking in Java 2nd. ed., moves you to the point where you can write your first Java program. Bruce Eckel gives an overview of the essentials... |
JavaWorld October 2000 Frank Sommers |
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute... |
JavaWorld May 2002 Ryan Daigle |
Eliminate JDBC overhead Most J2EE and other types of Java applications interact in some way with information persisted in a database. Interfacing with that database involves several iterations of SQL statements, connection management, transaction lifecycles, result processing, and exception handling. The many parts of this ritualistic dance are common in all contexts; however, this replication doesn't have to exist. This article outlines a flexible framework that remedies the repetition of interacting with a JDBC-compliant database. |
D-Lib May/Jun 2007 Saidis & Delis |
Type-consistent Digital Objects This article provides an overview of the Digital Object Prototype framework and highlights its type-conformance capabilities and shows how heterogeneous digital material can be treated in a uniform manner without resorting to custom developments. |
JavaWorld May 2001 Jeff Friesen |
Object-oriented language basics, Part 2 In this article, you'll gain an understanding about fields, parameters, and local variables and learn to declare and access fields and methods... |
JavaWorld December 2001 Jeff Friesen |
Trash talk, Part 1 One feature that distinguishes Java from other computer languages is its garbage collection abilities. In this article, This article introduces garbage collection and shows how Java's optional support for it affects your programs... |
JavaWorld April 2001 Geoff Friesen |
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes... |
JavaWorld June 2000 |
Letters to the Editor (June 23, 2000) Jason Hunter addresses a gripe with calling instanceof when using JDOM; Mark Johnson responds to feedback on his XML series; reader challenges Tony Sintes about whether it truly is impossible to write a swap method... |
JavaWorld August 2001 Jeff Friesen |
Object-oriented language basics, Part 5 Every Java class has a superclass. In the absence of an extends keyword, Object is that superclass. Object takes center stage as this article presents its 11 methods... |
JavaWorld June 2001 Jeff Friesen |
Object-oriented language basics, Part 3 The author explores composition and demonstrates its value in object-oriented programming. Composition and inheritance are design consepts related in a manner similar to both sides of the same coin... |
JavaWorld September 2000 Frank Sommers |
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services... |
JavaWorld March 2001 Brian Goetz |
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications... |
JavaWorld June 2001 Todd Sundsted |
Secure your Java apps from end to end, Part 1 The foundation of Java security: virtual machine and byte code security... |
JavaWorld July 2000 Bill Venners |
Objects versus documents for server-client interaction, Part 2 In this three-part series, Bill Venners compares the traditional approach to defining client/server interaction, using protocols and documents, with Jini's strategy of using objects and interfaces. |
D-Lib June 2001 John S. Erickson |
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... |
InternetNews January 9, 2008 Andy Patrizio |
SpringSource's Update to .NET Adds Key Java Features SpringSource's Spring.Net provides programmers with features previously only available to Java developers. |
JavaWorld September 2000 Tom Yager |
Microsoft's C# public beta hits a high note Java's success, and Sun's control of it, has prompted Microsoft to respond with its C# initiative. C# in many ways is a blend of the power of C++ and Java's built-in protections. Java developers will be well served to learn about C#'s pros and cons -- and how the initiative could affect Java's future. |
JavaWorld July 25, 2003 |
Letters to the Editor JavaWorld authors discuss byte code encryption, jEdit's attractive features, method synchronization, and more. |
D-Lib January 2002 Michael L. Nelson & B. Danette Allen |
Object Persistence and Availability in Digital Libraries We have measured the persistence and availability of digital objects in a variety of publicly available World Wide Web digital libraries DLs... |
JavaWorld November 2001 Kurt Jacobs |
Subscribe now for rapid prototyping Developers often find themselves reengineering an API to meet the demand of evolving requirements. By providing a framework for a more flexible system, the Publisher-Subscriber pattern can help you overcome some problems associated with object dependencies... |
JavaWorld August 2002 Greg Holling |
Put Java in the fast lane This article presents some techniques for locating performance bottlenecks in Java applications and offers suggestions for improving Java performance. Along the way, you'll look at some of the classes in the new java.nio package. |
Technology Research News December 1, 2004 |
Multicamera Surveillance Automated Researchers have developed a multi-camera surveillance system that allows the user to indicate an object in one view and automatically zoom to that object in all other views. |