Similar Articles |
|
JavaWorld August 2002 Guy Gur-Ari |
Empower RMI with TRMI Transparent Remote Method Invocation (TRMI) extends RMI to simplify the creation of distributed applications by allowing centralized RemoteException handling and by allowing any interface to be used remotely. This article tours TRMI's inner workings. |
JavaWorld September 2000 Frank Sommers |
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services... |
JavaWorld March 2001 Brian Goetz |
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications... |
JavaWorld November 2000 Jeremy Blosser |
Explore the Dynamic Proxy API In Java 1.3, Sun introduced the Dynamic Proxy API, which can basically mimic any interface. Add that to an abstract data model, and you can conform any loosely typed data to a strongly typed interface. This article discusses some of the Dynamic Proxy API's many benefits... |
JavaWorld December 19, 2003 Frank Sommers |
Call on extensible RMI Remote Method Invocation (RMI) has become a standard communication mechanism between remote Java objects. The latest RMI framework, Jini Extensible Remote Invocation features a powerful, highly configurable RMI security mechanism. |
JavaWorld September 2000 Tony Loton |
The smart approach to distributed performance monitoring with Java Smart stubs provide a lightweight, noninvasive mechanism for distributed performance monitoring and performance improvement through local caching. Although present in many commercial CORBA object request brokers, smart stubs are not standard in RMI or Java IDL. Read on to find out what you've been missing. |
JavaWorld July 2000 Todd M. Greanier |
Flatten your objects The Java Serialization API is used by many other Java APIs (like RMI and JavaBeans) to persist objects beyond the duration of a running virtual machine. This article tries to demystify the secrets of the Java Serialization API. |
JavaWorld April 2001 Kelly Davis & Robert Di Marco |
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management... |
JavaWorld July 18, 2003 James Carman |
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects. |
JavaWorld October 2000 Frank Sommers |
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute... |
JavaWorld May 9, 2003 Frank Sommers |
Jini Starter Kit 2.0 tightens Jini's security framework Security for distributed systems based on mobile Java code is the theme of Sun Microsystems' new Jini Starter Kit, JSK 2.0. This article introduces JSK 2.0's security-related features. |
JavaWorld August 2001 Jeff Friesen |
Object-oriented language basics, Part 5 Every Java class has a superclass. In the absence of an extends keyword, Object is that superclass. Object takes center stage as this article presents its 11 methods... |
JavaWorld April 2001 Geoff Friesen |
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes... |
JavaWorld September 2002 Tarak Modi |
J2SE 1.4 breathes new life into the CORBA community, Part 2 The Portable Object Adapter (POA), introduced in CORBA 2.2, replaced CORBA's Basic Object Adapter (BOA). An object adapter represents a core piece of the CORBA runtime on the server. This article explore J2SE 1.4's POA support. |
JavaWorld February 2002 David Geary |
Take control with the Proxy design pattern The Proxy design pattern in Java lets you substitute a proxy for an object. In that capacity, proxies prove useful in many situations, ranging from Web services to Swing icons... |
JavaWorld April 2001 Piet Jonas |
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods... |
JavaWorld January 2002 Jeff Friesen |
Trash talk, Part 2 This article explores the Reference Objects API, an API that allows your programs to interact with the garbage collector in limited ways... |
JavaWorld December 2001 Jeff Friesen |
Trash talk, Part 1 One feature that distinguishes Java from other computer languages is its garbage collection abilities. In this article, This article introduces garbage collection and shows how Java's optional support for it affects your programs... |
JavaWorld March 2001 Jeffrey Peden |
Browse user interfaces for Jini services The ServiceUI specification developed by the Jini.org community defines a suggested procedure for attaching user interfaces to Jini services... |
JavaWorld July 2000 Sastry K. Malladi |
Oracle8i's ORB does the trick An in-depth overview of developing scalable and secure server-side Java CORBA applications using Oracle8i JVM and ORB. Also, session-based IIOP is introduced. |
JavaWorld July 2001 Tarak Modi |
Clean up your wire protocol with SOAP, Part 4 Here's a framework based on the dynamic proxy classes in the Java 2 Platform, Version 1.3. This framework will make creating SOAP clients just as easy and intuitive as creating SOAP services... |
JavaWorld November 2001 Kurt Jacobs |
Subscribe now for rapid prototyping Developers often find themselves reengineering an API to meet the demand of evolving requirements. By providing a framework for a more flexible system, the Publisher-Subscriber pattern can help you overcome some problems associated with object dependencies... |
JavaWorld August 2002 Tarak Modi |
J2SE 1.4 breathes new life into the CORBA community, Part 1 The new CORBA features in J2SE (Java 2 Platform, Standard Edition) 1.4, and how you can use them to create highly scalable and robust applications. Includes a brief tutorial on creating a simple CORBA-based application using J2SE 1.4. |
JavaWorld January 2001 Gregg Sporar |
Retrofit existing applications with RMI Partitioning an existing application so it is distributed across multiple CPUs is easy using Java's Remote Method Invocation (RMI). However, RMI must be carefully introduced into existing source code... |
JavaWorld October 2002 Tarak Modi |
J2SE 1.4 breathes new life into the CORBA community, Part 3 This hands-on article shows you how to use the Portable Object Adapter to create enterprise-level applications. |
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work. |
JavaWorld February 2002 Anders Eliasson |
Implement Design by Contract for Java using dynamic proxies The Design by Contract (DBC) theory can dramatically raise software quality and reusability levels by forcing you to think in terms of contracts. Contracts formally specify the responsibility relationship between a client (class user) and a supplier (class). Additionally, DBC clearly separates specification (what) from implementation (how). This article explains DBC's importance in object-oriented development and describes a DBCProxy framework that achieves DBC transparently in Java using dynamic proxy classes. |
JavaWorld May 2001 Markus Dorn |
Reading objects is easy with SAX By following some simple rules when mapping objects to XML, you can easily read object structures, even complex ones, from XML. See how you can use SAX to eliminate that complexity... |
JavaWorld February 2001 Brian Goetz |
Design for performance, Part 2: Reduce object creation Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. The author discusses some techniques for reducing temporary object creation... |
JavaWorld June 2002 Dirk Laessig |
Score big with JSR 77, the J2EE Management Specification The specification's core is based on the model of managed objects, explained in this article. JSR 77 also defines an Enterprise JavaBeans (EJB) component for easily accessing these managed objects. |
JavaWorld November 2001 Bishop & Warren |
Jini-like discovery for RMI Not yet on the Jini bandwagon? Despite its powerful mechanisms, Jini has yet to be accepted in mainstream Java development. Until that happens, developers need to find better Remote Method Invocation (RMI) solutions. This article walks you through a Jini-like discovery mechanism for your RMI development. |
JavaWorld March 2002 Matjaz B. Juric |
Integrate EJBs with CORBA Interoperability between EJBs and CORBA is important for integrating Java- and non-Java-based applications. This article shows how to achieve integration between an EJB and a CORBA C++ application... |
JavaWorld September 2001 Ashok Mathew & Mark Roulo |
Accelerate your RMI programming Beginning with JDK 1.1, serialization and Remote Method Invocation (RMI) were added to the Java platform. RMI usually runs slower than equivalent CORBA or remote procedure call (RPC) solutions. Fortunately, RMI was designed so that you could apply hand optimizations... |
JavaWorld November 2000 Todd Sundsted |
Signed and sealed objects deliver secure serialized content The Java serialization mechanism does not protect the serialized content, and thus introduces the possibility of security flaws in applications using serialization. Two classes are designed to protect the contents of serialized objects from manipulation and examination... |
JavaWorld June 2001 Jeff Friesen |
Object-oriented language basics, Part 3 The author explores composition and demonstrates its value in object-oriented programming. Composition and inheritance are design consepts related in a manner similar to both sides of the same coin... |
JavaWorld May 2002 Ryan Daigle |
Eliminate JDBC overhead Most J2EE and other types of Java applications interact in some way with information persisted in a database. Interfacing with that database involves several iterations of SQL statements, connection management, transaction lifecycles, result processing, and exception handling. The many parts of this ritualistic dance are common in all contexts; however, this replication doesn't have to exist. This article outlines a flexible framework that remedies the repetition of interacting with a JDBC-compliant database. |
JavaWorld September 2001 Jeff Friesen |
Object-oriented language basics, Part 6 Learn why Java's standard class library contains empty interfaces (such as Cloneable and Serializable). Also, examine the power of interfaces and learn why they provide more than a workaround for Java's lack of multiple implementation inheritance support... |
JavaWorld January 2001 Wm. Paul Rogers |
Thanks type and gentle class Confusing the concepts of object and class deserves an askance look. Failing to distinguish between type and class, however, typically goes unnoticed. Yet the battle to separate implementation and interface concerns requires type-oriented thinking... |
JavaWorld March 2002 James Carman |
Write once, persist anywhere Most J2EE applications strive to abstract the database tier by employing the Data Access Object design pattern. This article shows you a DAO pattern framework that you can reuse on all your projects, regardless of object type... |
JavaWorld September 2000 Bruce Eckel |
Everything is an object, Part 1 This two-part article, excerpted from Chapter 2 in Thinking in Java 2nd. ed., moves you to the point where you can write your first Java program. Bruce Eckel gives an overview of the essentials... |
JavaWorld November 2001 Jeff Friesen |
Class and object initialization An exploration of class and object initialization, which introduces the strange concepts of the <clinit> and <init> methods... |
JavaWorld May 2002 Nik Silver |
Jtrix: Web services beyond SOAP This article describes Jtrix, an open source Web services platform for secure, roving applications. It examines the limits of existing standards, Jtrix's core model, and how Jtrix enables you to create Web services in such areas as hosting, disk space, and CPU time... |
JavaWorld April 2001 Nate Sammons |
Robust event logging with Syslog Because event logging is often an afterthought, Java developers often ignore this task while programming. However, logging allows developers to instrument their code so the operations staff can deal with any problems that arise... |
JavaWorld July 2000 Bill Venners |
Objects versus documents for server-client interaction, Part 2 In this three-part series, Bill Venners compares the traditional approach to defining client/server interaction, using protocols and documents, with Jini's strategy of using objects and interfaces. |
JavaWorld May 2001 Jeff Friesen |
Object-oriented language basics, Part 2 In this article, you'll gain an understanding about fields, parameters, and local variables and learn to declare and access fields and methods... |
JavaWorld August 1, 2003 Allen Holub |
Why extends is evil Improve your code by replacing concrete base classes with interfaces |
JavaWorld April 2002 Jeff Friesen |
Exceptions to the programming rules, Part 2 Learn about Java's exceptions class hierarchy, how to extend those classes, how to throw objects created from exception classes, how to catch thrown objects and handle the exceptions they represent, and how to clean your code... |
D-Lib Jul/Aug 2000 Thornton Staples & Ross Wayland |
Virginia Dons FEDORA: A Prototype for a Digital Object Repository After shopping for a digital library system unsuccessfully, in 1999 we created a digital library research and development group and set about creating the system that we need. |
JavaWorld February 2002 Luke Taylor |
Customized EJB security in JBoss The current Enterprise JavaBeans specification supports basic declarative, role-based access-control mechanisms, but provides limited support for coding application-specific security checks. Moreover, it doesn't define any way to factor out access-control code from business logic, or to integrate external authorization services. The open source, J2EE-compliant JBoss application server features a protection-proxy security architecture that will help you overcome these restrictions. |
JavaWorld October 2001 Jeff Friesen |
Object-oriented language basics, Part 7 This final installment of Java 101's object-oriented programming series explores Java's support for polymorphism and investigates how abstract classes accommodate generalities in class hierarchies. |