Similar Articles |
|
JavaWorld January 2001 Thomas E. Davis & Craig Walker |
Take control of the servlet environment, Part 3 Browser cookies are wolves in sheep's clothing. Developers use these incredibly simple and useful mechanisms to create Web-based applications that rely on the persistence of sessions. However, cookies feature an odd little problem in relation to subdomains... |
JavaWorld November 2000 Thomas E. Davis, Craig Walker |
Take control of the servlet environment, Part 1 The ever-popular servlet cleanly and simply develops and deploys Web-based applications. However, although Java is platform independent, the Web as a whole is not. The language and the servlet API do not provide such niceties as optional session-persistence schemas (i.e., store in memory, in a database, or in a cookie), and they don't easily accommodate ad hoc solutions to shortcomings in cookie handling. To handle such issues, Thomas Davis and Craig Walker have developed an unobtrusive framework, an invisible layer between your servlets and the servlet engine, that gives you greater control over the environment. |
JavaWorld April 2001 Kelly Davis & Robert Di Marco |
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... |
Linux Journal August 2000 Reuven M. Lerner |
At the Forge Session Management with Mason. This Perl-based web helper and MySQL work together to let you quickly build a user registration system for your web site. |
JavaWorld April 2002 Michael Juntao Yuan & Ju Long |
Track wireless sessions with J2ME/MIDP Every e-commerce application must support session tracking. Unfortunately, MIDP, a J2ME technology, supports only the standard HTTP protocol, which is stateless. This article explores ways to add session support into the current MIDP network API framework... |
JavaWorld January 2002 Yuan & Long |
Build database-powered mobile applications on the Java platform This article explains how to create mobile database applications using the Java 2 Platform, Micro Edition/Mobile Information Device Profile (J2ME/MIDP) and the Java 2 Platform, Enterprise Edition (J2EE). The authors introduce an architecture that uses JavaServer Pages (JSPs) as middleware between a MIDP frontend and a database backend. They also explain specific design decisions and implementation issues, such as persistent storage, network connection, session management, and data communication. Their discussion focuses on the integration between the client and server-side Java applications. |
JavaWorld July 18, 2003 James Carman |
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects. |
JavaWorld December 5, 2003 Borislav Iordanov |
Dynamic server includes with local runtime context This article shows how to achieve true black-box reuse of frontend logic in the form of JSP pages or Java servlets, by wrapping the servlet request object and effectively creating a local runtime context for an included resource. |
JavaWorld March 2003 Jason Hunter |
Servlet 2.4: What's in store On March 7, 2003, Sun Microsystems released the "Proposed Final Draft 2" specification for Servlet 2.4. This article explains the differences between Servlet 2.3 and 2.4, discusses the reasons for the changes, and explains how you can take advantage of the new features in 2.4. |
Linux Journal October 9, 2001 Eric Rescorla |
An Introduction to OpenSSL Programming, Part II of II This article shows how to use a number of advanced features such as session resumption and client authentication... |
JavaWorld August 2002 Guy Gur-Ari |
Empower RMI with TRMI Transparent Remote Method Invocation (TRMI) extends RMI to simplify the creation of distributed applications by allowing centralized RemoteException handling and by allowing any interface to be used remotely. This article tours TRMI's inner workings. |
JavaWorld January 2002 Jason Cai |
Combine the Session Facade pattern with XML This article explores the benefits and advantages of using the Session Facade pattern. The author discusses when to use the pattern with value objects, and when to use it with XML. He also provides a detailed implementation of the Session Facade pattern integrated with XML... |
JavaWorld May 2002 Ryan Daigle |
Eliminate JDBC overhead Most J2EE and other types of Java applications interact in some way with information persisted in a database. Interfacing with that database involves several iterations of SQL statements, connection management, transaction lifecycles, result processing, and exception handling. The many parts of this ritualistic dance are common in all contexts; however, this replication doesn't have to exist. This article outlines a flexible framework that remedies the repetition of interacting with a JDBC-compliant database. |
JavaWorld March 2002 |
Letters to the Editor JavaWorld readers warn about synchronization; present a Servlet 2.2-compliant solution for mixing protocols in Web apps; suggest using the Data Object Access design pattern with the Value Object design pattern... etc. |
New Architect April 2002 Al Williams |
A Cookie by Any Other Name Is it safe to use cookies again? |
JavaWorld October 2001 Tony Loton |
JavaMail quick start This article shows the first steps on the road to building Java-based email applications. If you fancy building your own email client to replace Microsoft Outlook, or a Web-based email system to rival Hotmail, this is the place to start... |
JavaWorld December 2000 Jeremy Roschelle |
Untangle your servlet code with reflection You can enlist the Reflection API to unravel an all-too-common problem in servlet development: doGet() and doPost() methods that grow long, complex, and hard to extend and debug. The use of reflection described here is fairly lightweight... |
JavaWorld June 2000 Thomas E. Davis |
Use Microsoft's Internet Information Server as a Java servlet engine Are you a Java fanatic trapped in a Microsoft-only shop? Using just Microsoft's Internet Information Server and pure Java, you can run Java servlets without the help of any third-party products. |
JavaWorld October 2002 Abulsorour & Visveswaran |
Business process automation made easy with Java, Part 2 Design options for rule engine integration, data synchronization considerations, workflow engine integration, and some best-practice quality-of-service considerations. Also, emerging data interchange standards that enable a more flexible solution |
Linux Journal April 2000 Nalneesh Gaur |
Assessing the Security of Your Web Applications An outline of key test areas to identify security issues in a web application and provide measures to minimize them. |
Linux Journal November 2001 Michael Yuan |
Linux in Education: Implementing a Research Knowledge Base Keeping up with large volumes of research requires a system both flexible and intuitive... |
JavaWorld August 2001 Jeff Friesen |
Object-oriented language basics, Part 5 Every Java class has a superclass. In the absence of an extends keyword, Object is that superclass. Object takes center stage as this article presents its 11 methods... |
JavaWorld April 2001 Piet Jonas |
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... |
JavaWorld February 2001 Steven Gould |
Servlets in Apache Tomcat and BEA Systems' WebLogic Server This article reviews the steps involved in developing servlets, then describes how to take the servlet and create a Web application -- in both expanded format and as a WAR. He illustrates how to deploy the Web application in Apache Tomcat -- a widely used, freeware servlet container... |
Linux Journal January 1, 2002 Logan G. Harbaugh |
Product Review: Coyote Point Equalizer The Coyote Point Equalizer E350 is a good example of the load-balancing appliance. .. |
JavaWorld January 2001 Jason Hunter |
Servlet 2.3: New features exposed In October 2000, Sun released the 'Proposed Final Draft' specification for Servlet API 2.3. This article explains the differences between Servlet API 2.2 and 2.3, discusses the reasons for the changes, and shows you how to write servlets (and now filters!) using 2.3... |
JavaWorld August 2001 Rinaldo Di Giorgio |
Serve clients' specific protocol requirements with Brazil, Part 5 How to use Brazil to process content from diverse Websites, tailor the content to reflect a user's desires, and provide the content as a Web service -- and how to use Brazil to integrate new technologies with legacy Web applications that aren't XML-enabled... |
JavaWorld June 2001 Jason Hunter |
Filter code with Servlet 2.3 model An in-depth look at the new servlet filter model with an examination of several freely available filters. You'll learn how these filters work and what you can do with them... |
JavaWorld April 2002 Sonal Bansal |
A recipe for cookie management Client-side HTTP state management is important for creating Java applications that need to interact with Web applications like browser-based email or online banking services. This article presents a cookie library for robust and easy client-side HTTP state management in Java... |
JavaWorld August 29, 2003 David Geary |
Follow the Chain of Responsibility The Chain of Responsibility (CoR) pattern decouples the sender and receiver of a request by interposing a chain of objects between them. This article discusses the CoR pattern and two implementations of that pattern in the Java APIs -- one from client-side Java and the other from server-side. |
D-Lib Jul/Aug 2000 Thornton Staples & Ross Wayland |
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. |
Linux Journal March 29, 2007 Mike Diehl |
Writing Web Applications with Web Services and Ajax An Ajax primer with Perl and PostgreSQL. |
JavaWorld January 2, 2004 Allen Holub |
More on getters and setters This article provides one of several possible programmatic solutions to the get/set-elimination problem. In particular, it demonstrates how to construct both Web-based and client-side user interfaces without exposing your object's implementation to the entire program. |
Linux Journal April 1, 2007 Girish Venkatachalam |
The OpenSSH Protocol under the Hood The nitty-gritty details as to what OpenSSH is and why it is ubiquitous. |
JavaWorld March 2001 Jeremy Roschelle |
Doclet your servlet! In many projects, some team members will write servlets while other team members write the Webpages that invoke those servlets. So how can a servlet coder easily produce documentation for a Web designer? |
InternetNews March 9, 2010 |
Blue Coat Backing Armored Browser Networking and security firm offers commercial support for Quaresso, a startup offering a new spin on the armored browser with remote support to shore up the last mile. |
PC Magazine August 30, 2006 |
Saving Your Session in Firefox Firefox can remember the last web page visited, but Internet Explorer can not. |
InternetNews December 29, 2003 |
November 2003 Internet Usage Stats The average Internet activity -- both at work and at home -- in November 2003 for surfers in the U.S., UK, and Australia, as reported by Nielsen//NetRatings Inc. |
D-Lib Nov/Dec 2009 Cristina & Daniel Tofan |
A Low Cost, Low Memory Footprint, SQL and Servlet-based Solution for Searching Archived Images and Documents in Digital Collections A simple, elegant solution to digitizing special collections documents to meet the needs of the institution without additional monetary commitments. |
Technology Research News December 17, 2003 |
Hybrid crypto secures images Researchers from National Chung Cheng University and National Yunlin University of Science and Technology in Taiwan have devised a way to encrypt in a single communication an image and the secret session key that unlocks the image. |
PC World March 26, 2001 Dennis O'Reilly |
Three Tools That Make Cookies More Palatable Some Internet cookies are helpful, some are harmful. These three tools help you distinguish friend from foe... |
Entrepreneur January 2007 Amanda C. Kooser |
Chart Art Business plans aren't just about the written word; they're also about visuals. Building professional looking pie, bar, area, radar, bubble and line charts has just gotten easier with an online offering from Business Resource Software. |