MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
JavaWorld
July 18, 2003
James Carman
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects. mark for My Articles similar articles
JavaWorld
December 2001
Sanjay Dahiya
Cut down on logging errors with Jylog This article introduces Jylog, a new approach to error-free and flexible event logging. Based on the Java Platform Debugger Architecture, Jylog completely separates logging from coding. Learn how Jylog and its underlying technology, JPDA, work, and how you can use them... mark for My Articles similar articles
Linux Journal
July 2000
Michael A. Schwarz
Take Command: The System Logging Daemons, syslogd and klog Take command of your log files by learning to handle those pesky logging daemons. mark for My Articles similar articles
JavaWorld
April 2002
Jeff Friesen
Exceptions to the programming rules, Part 2 Learn about Java's exceptions class hierarchy, how to extend those classes, how to throw objects created from exception classes, how to catch thrown objects and handle the exceptions they represent, and how to clean your code... mark for My Articles similar articles
JavaWorld
November 2000
Ceki Gulcu
Log4j delivers control over logging Log4j, an open source project, allows Java developers to control which log statements are output with arbitrary granularity. It's fully configurable at runtime by using external configuration files. Best of all, log4j has a gentle learning curve. Beware: judging from user feedback, it is also quite addictive. Project founder Ceki Gulcu describes the log4j API, its unique features, and its design rationale. mark for My Articles similar articles
JavaWorld
August 2002
Guy Gur-Ari
Empower RMI with TRMI Transparent Remote Method Invocation (TRMI) extends RMI to simplify the creation of distributed applications by allowing centralized RemoteException handling and by allowing any interface to be used remotely. This article tours TRMI's inner workings. mark for My Articles similar articles
JavaWorld
September 2000
Humphrey Sheil
Frameworks save the day Every Enterprise Java project has the same basic plumbing. By embracing this premise, you can cut project costs and improve software quality in one swoop. Even the lightweight framework outlined in this article can add significant value to your project -- with immediate gains... mark for My Articles similar articles
JavaWorld
September 2001
Sunil Kumar & Nitin Nanda
Log it or lose it How to enable a Java application to log messages to the NT Event Log... mark for My Articles similar articles
Linux Journal
October 1, 2002
Mick Bauer
Paranoid Penguin: Stealthful Sniffing, Intrusion Detection and Logging Attackers can't rewrite your log files if they can't connect to the log server. Learn the ways of stealth. mark for My Articles similar articles
JavaWorld
November 2002
Tarak Modi
J2SE 1.4 breathes new life into the CORBA community, Part 4 The conclusion to this series on enterprise CORBA development with J2SE 1.4 discusses two important topics: portable interceptors and the Interoperable Naming Service (INS). Those interested in extending ORB functionality, or passing additional call context information during runtime, will find portable interceptors useful. All CORBA developers will find the section on the INS refreshing because it provides a layer on top of the CORBA Naming Service that features support for stringified and user friendly URL names and standardized bootstrapping. mark for My Articles similar articles
Linux Journal
August 2000
Michael A. Schwarz
Take Command klogd: The Kernel Logging Daemon mark for My Articles similar articles
JavaWorld
August 2001
Jeff Friesen
Object-oriented language basics, Part 5 Every Java class has a superclass. In the absence of an extends keyword, Object is that superclass. Object takes center stage as this article presents its 11 methods... mark for My Articles similar articles
JavaWorld
February 2001
Anil Hemrajani
Are you still using print statements for debugging? For decades now, programmers have used some form of print statements for debugging, diagnostic, and/or logging purposes. While that technique makes sense for logging and diagnostics, more effective ways to debug your Java code are available today... mark for My Articles similar articles
JavaWorld
September 2000
Frank Sommers
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services... mark for My Articles similar articles
JavaWorld
November 2000
M. Jeff Wilson
Get smart with proxies and RMI RMI enables developers to either get a remote reference to a distributed object, in which all method calls are forwarded to the server object, or get a copy of the remote object and invoke on it locally. You can combine these approaches in a way that is transparent to the client code... mark for My Articles similar articles
JavaWorld
October 2000
Frank Sommers
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute... mark for My Articles similar articles
JavaWorld
December 2001
Jeff Friesen
Trash talk, Part 1 One feature that distinguishes Java from other computer languages is its garbage collection abilities. In this article, This article introduces garbage collection and shows how Java's optional support for it affects your programs... mark for My Articles similar articles
JavaWorld
April 2001
Piet Jonas
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... mark for My Articles similar articles
JavaWorld
May 2001
Jeff Friesen
Object-oriented language basics, Part 2 In this article, you'll gain an understanding about fields, parameters, and local variables and learn to declare and access fields and methods... mark for My Articles similar articles
D-Lib
Jan/Feb 2010
Reilly & Tupelo-Schneck
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. mark for My Articles similar articles
JavaWorld
March 2001
Brian Goetz
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications... mark for My Articles similar articles
InternetNews
January 9, 2008
Andy Patrizio
SpringSource's Update to .NET Adds Key Java Features SpringSource's Spring.Net provides programmers with features previously only available to Java developers. mark for My Articles similar articles
Linux Journal
May 1, 2000
Jacek Artymiak
Python Programming for Beginners If you want to outsmart the Spanish Inquisition, learn Python. This article is a practical introduction to writing non-trivial applications in Python. mark for My Articles similar articles
JavaWorld
April 2001
Geoff Friesen
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes... mark for My Articles similar articles
Unix Insider
September 2000
Peter Baer Galvin
Why aren't you logging? This month Pete discusses a new, must-use feature included in Solaris 7 and 8, and recommends two helpful articles from Sunsolve. mark for My Articles similar articles
RootPrompt.org
May 17, 2000
Lance Spitzner
Watching Your Logs How to automate the filtering of your logs, freeing up your time while alerting you with the information you need. mark for My Articles similar articles
Linux Journal
April 2000
Gaelyne R. Gasson
Web Analysis Using Analog Every web site needs a way to get accurate statistics--here's a freely available program to give you that information. mark for My Articles similar articles
PC Magazine
April 4, 2006
Neil J. Rubenking
Safe Eyes 2006 Safe Eyes 2006 monitors and controls what your kids do online, alerting you to violations via e-mail, text, or phone. mark for My Articles similar articles
D-Lib
June 2001
John S. Erickson
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure... mark for My Articles similar articles
Inc.
November 15, 2000
Bronwyn Fryer
Logging On the Web If you're marketing to a niche or need an online forum for fresh ideas, Web logs could be the new killer app... mark for My Articles similar articles
PC World
May 2006
Scott Dunn
Spot PC Trouble Early With Windows' Event Viewer Make sense of Windows' logs... View past chkdsk results... Get more event information for free... mark for My Articles similar articles