Java security evolution and concepts, Part 2
Discover the ins and outs of Java security One of Java’s main features is its ability to move code over a network and run that code. Unlike other languages, Java has been designed to do this securely. Java security has…
Objects versus documents for server-client interaction, Part 2
Determining the best approach when there is no client-side user In Part 1 of this series, I demonstrated two approaches to defining the interaction between a client and a newsfeed server: using documents and protocols and using objects and interfaces.…
Easy Java/XML integration with JDOM, Part 2
Use JDOM to create and mutate XML In Part 1 of this series, we introduced you to JDOM, and discussed how you can use it to extract information from an existing XML data source such as a file, input stream,…
Secant keeps Web servers responsive
Secant’s Extreme Internet Server 3.5 Web server is good for what ails you Managing server-side Java applications is the diciest challenge in running a Website. Because your applications are coded to run on a particular server, your customer requests may…
News and New Product Briefs (July 21, 2000)
INDEXHEAD: ParaSoft and CodeMarket form alliance ParaSoft and CodeMarket have joined forces to develop outsourced software components. Under the agreement, Parasoft’s Jtest Java-testing tool will be used for all components outsourced or purchased through CodeMarket’s software development network. CodeMarket will…
Crafting Metadata
Decouple applications and their details using properties, XML, and cryptography When a story is reconstructed, its central plot doesn’t change. But depending on the author and audience, the plot is obfuscated by changes in context: settings, scene sequences, characters, tone,…
HMVC: The layered pattern for developing strong client tiers
This hierarchical model eases the development of a Java-based client tier The task of designing and developing the client tier of an n-tier Web architecture often challenges developers. This is particularly true in the Web world, where the sheer variety…
Oracle8i’s ORB does the trick
Develop scalable and secure Java CORBA applications with Oracle8i Oracle8i features a built-in JVM, an embedded ORB (object request broker) based on OMG’s (Object Management Group) CORBA specification, and useful services such as an EJB component model. In this article,…
Build a better mouse trap
Take a look at the ins and outs of mouse events Q: What is the difference between the mouseClicked() and mousePressed() methods of the MouseListener interface? A: Java’s AWT library supplies two interfaces that allow listeners to receive mouse events.…
Java Tip 98: Reflect on the Visitor design pattern
Implement visitors in Java, using reflection Collections are commonly used in object-oriented programming and often raise code-related questions. For example, “How do you perform an operation across a collection of different objects?” One approach is to iterate through each element…