| Similar Articles |
 |
JavaWorld July 2001 Tarak Modi |
Clean up your wire protocol with SOAP, Part 4 Here's a framework based on the dynamic proxy classes in the Java 2 Platform, Version 1.3. This framework will make creating SOAP clients just as easy and intuitive as creating SOAP services...  |
JavaWorld November 2000 M. Jeff Wilson |
Get smart with proxies and RMI RMI enables developers to either get a remote reference to a distributed object, in which all method calls are forwarded to the server object, or get a copy of the remote object and invoke on it locally. You can combine these approaches in a way that is transparent to the client code...  |
JavaWorld February 2002 David Geary |
Take control with the Proxy design pattern The Proxy design pattern in Java lets you substitute a proxy for an object. In that capacity, proxies prove useful in many situations, ranging from Web services to Swing icons...  |
JavaWorld May 9, 2003 Frank Sommers |
Jini Starter Kit 2.0 tightens Jini's security framework Security for distributed systems based on mobile Java code is the theme of Sun Microsystems' new Jini Starter Kit, JSK 2.0. This article introduces JSK 2.0's security-related features.  |
JavaWorld July 18, 2003 James Carman |
Get down to business In this article, you will learn how to structure your applications such that modifications to the business object implementation do not require changes to the user interface using a simple framework for accessing your business objects.  |
JavaWorld August 2002 Guy Gur-Ari |
Empower RMI with TRMI Transparent Remote Method Invocation (TRMI) extends RMI to simplify the creation of distributed applications by allowing centralized RemoteException handling and by allowing any interface to be used remotely. This article tours TRMI's inner workings.  |
JavaWorld September 2000 Frank Sommers |
Activatable Jini services, Part 1: Implement RMI activation Jini services must be long-lived and resilient, and must efficiently manage their computational resources with little user intervention. This article shows how to use RMI activation to manage computational resources and increase the availability of Jini services...  |
JavaWorld August 2001 Bill W. Davis |
Dynamically extend Java applications Do you want to write programs that can be extended without source code changes? The techniques described in this article show you how to use interfaces and dynamic class loading to create highly extensible systems...  |
JavaWorld February 2002 Anders Eliasson |
Implement Design by Contract for Java using dynamic proxies The Design by Contract (DBC) theory can dramatically raise software quality and reusability levels by forcing you to think in terms of contracts. Contracts formally specify the responsibility relationship between a client (class user) and a supplier (class). Additionally, DBC clearly separates specification (what) from implementation (how). This article explains DBC's importance in object-oriented development and describes a DBCProxy framework that achieves DBC transparently in Java using dynamic proxy classes.  |
JavaWorld May 2002 Toby Reyelts |
Integrate Java and C++ with Jace Jace -- a free, open source toolkit -- lets you easily write JNI (Java Native Interface) code. This article analyzes in detail the JNI API's problems and how Jace solves them...  |
JavaWorld April 2001 Piet Jonas |
Secure type-safe collections A framework that overcomes the standard Java Collections Framework's main problem: its containers lack the ability to restrict themselves to storing objects of a specific type. The solution uses reflection, wrapper classes, and a collection of static factory methods...  |
JavaWorld August 2001 Jeff Friesen |
Object-oriented language basics, Part 5 Every Java class has a superclass. In the absence of an extends keyword, Object is that superclass. Object takes center stage as this article presents its 11 methods...  |
JavaWorld April 2001 Geoff Friesen |
Object-oriented language basics, Part 1 An introduction to object-oriented programming and how to declare classes and create objects from those classes...  |
JavaWorld January 2001 Wm. Paul Rogers |
Thanks type and gentle class Confusing the concepts of object and class deserves an askance look. Failing to distinguish between type and class, however, typically goes unnoticed. Yet the battle to separate implementation and interface concerns requires type-oriented thinking...  |
JavaWorld July 2000 Todd M. Greanier |
Flatten your objects The Java Serialization API is used by many other Java APIs (like RMI and JavaBeans) to persist objects beyond the duration of a running virtual machine. This article tries to demystify the secrets of the Java Serialization API.  |
JavaWorld June 13, 2003 Camerlengo & Johnson |
Make the Java-Oracle9i connection This article provides Java programmers with techniques for utilizing Oracle9i's new object-oriented features such as inheritance, custom constructors, dynamic dispatch, array descriptors, and mapping strategies from a Java class hierarchy to an Oracle type hierarchy without using traditional object-relational (O/R) mapping strategies.  |
JavaWorld September 26, 2003 Sam Mefford |
Overcome Java 1.3-1.4 incompatibilities API version incompatibilities that force you to maintain separate codebases for newer versions can exponentially increase your frustration level. This article demonstrates techniques for overcoming interface version incompatibilities, charting a course for a single codebase.  |
JavaWorld October 2000 Frank Sommers |
Activatable Jini services, Part 2: Patterns of use This article concentrates on the consequences of activation in the Jini context. Sommers exponds on the issue of deactivating objects, then considers the implications of deactivation for well-designed Jini services and how the Jini helper services introduced in the 1.1 beta version of the JSK can contribute...  |
JavaWorld March 2001 Jeffrey Peden |
Browse user interfaces for Jini services The ServiceUI specification developed by the Jini.org community defines a suggested procedure for attaching user interfaces to Jini services...  |
JavaWorld February 2002 Luke Taylor |
Customized EJB security in JBoss The current Enterprise JavaBeans specification supports basic declarative, role-based access-control mechanisms, but provides limited support for coding application-specific security checks. Moreover, it doesn't define any way to factor out access-control code from business logic, or to integrate external authorization services. The open source, J2EE-compliant JBoss application server features a protection-proxy security architecture that will help you overcome these restrictions.  |
JavaWorld January 2001 Jean-Pierre Dube |
Printing in Java, Part 3 Part 3 of our series on Java printing introduces you to the print framework. Working on top of the Java Print API, the framework will make printing pages much easier by providing such features as a print-preview facility, a portable page-setup dialog, and graphics primitives...  |
JavaWorld July 2000 Bill Venners |
Objects versus documents for server-client interaction, Part 2 In this three-part series, Bill Venners compares the traditional approach to defining client/server interaction, using protocols and documents, with Jini's strategy of using objects and interfaces.  |
JavaWorld March 2003 David Geary |
An inside view of Observer The Observer pattern lets you build extensible software with pluggable objects by allowing communication between loosely coupled objects. The author explores the Observer pattern, how it's used throughout the Java 2 SDK, and how you can implement the pattern in your own code.  |
JavaWorld November 2001 Kurt Jacobs |
Subscribe now for rapid prototyping Developers often find themselves reengineering an API to meet the demand of evolving requirements. By providing a framework for a more flexible system, the Publisher-Subscriber pattern can help you overcome some problems associated with object dependencies...  |
JavaWorld September 2001 Jeff Friesen |
Object-oriented language basics, Part 6 Learn why Java's standard class library contains empty interfaces (such as Cloneable and Serializable). Also, examine the power of interfaces and learn why they provide more than a workaround for Java's lack of multiple implementation inheritance support...  |
JavaWorld September 2000 Bruce Eckel |
Everything is an object, Part 1 This two-part article, excerpted from Chapter 2 in Thinking in Java 2nd. ed., moves you to the point where you can write your first Java program. Bruce Eckel gives an overview of the essentials...  |
JavaWorld June 2001 Jeff Friesen |
Object-oriented language basics, Part 3 The author explores composition and demonstrates its value in object-oriented programming. Composition and inheritance are design consepts related in a manner similar to both sides of the same coin...  |
JavaWorld March 2001 Brian Goetz |
Design for performance, Part 3: Remote interfaces Many common Java performance problems stem from class design decisions made early in the design process, long before most developers even start thinking about performance. This article examines performance issues specific to remote applications...  |
JavaWorld October 2000 Bruce Eckel |
Everything is an object, Part 2 Eckel takes you through name visibility and using components from other libraries; the static keyword; and comments and embedded documentation. By the end, you should be able to build your first Java program...  |
D-Lib Jan/Feb 2010 Reilly & Tupelo-Schneck |
Digital Object Repository Server: A Component of the Digital Object Architecture This paper introduces the Digital Object Repository Server, the most recent instantiation of the Corporation for National Research Initiatives' repository work.  |
Linux Journal May 2000 James Norton |
Dynamic Class Loading for C++ on Linux A technique that will provide developers with much flexibility in design.  |
JavaWorld April 2001 Kelly Davis & Robert Di Marco |
Manage distributed sessions Using RMI and the Proxy API introduced in JDK 1.3, this article describes a technique that allows one or more servlet servers to maintain session information on one or more session servers. By adopting this architecture, no single point of failure will exist for session management...  |
JavaWorld March 2002 |
Letters to the Editor JavaWorld readers warn about synchronization; present a Servlet 2.2-compliant solution for mixing protocols in Web apps; suggest using the Data Object Access design pattern with the Value Object design pattern... etc.  |
D-Lib May/Jun 2007 Saidis & Delis |
Type-consistent Digital Objects This article provides an overview of the Digital Object Prototype framework and highlights its type-conformance capabilities and shows how heterogeneous digital material can be treated in a uniform manner without resorting to custom developments.  |
InternetNews January 9, 2008 Andy Patrizio |
SpringSource's Update to .NET Adds Key Java Features SpringSource's Spring.Net provides programmers with features previously only available to Java developers.  |
JavaWorld September 2000 Tom Yager |
Microsoft's C# public beta hits a high note Java's success, and Sun's control of it, has prompted Microsoft to respond with its C# initiative. C# in many ways is a blend of the power of C++ and Java's built-in protections. Java developers will be well served to learn about C#'s pros and cons -- and how the initiative could affect Java's future.  |
T.H.E. Journal September 2004 |
Vox Proxy If you use PowerPoint, you'll love Right Seat Software's PowerPoint companion software Vox Proxy.  |
JavaWorld February 2001 Erwin Vervaet |
Java: It's a good thing In response to Simson Garfinkel's article 'Java: Slow, Ugly, and Irrelevant', the author takes a more realistic look at Java's situation. Indeed, Java is far from perfect. But when you take the time to look beyond the flames and the hype, what is left is an exciting and competitive language...  |
CFO November 1, 2010 |
Missing from Proxies: Risk Talk A new study finds that companies aren't disclosing as many details as they might.  |
The Motley Fool November 12, 2010 Alyce Lomax |
Welcome to Proxy Fight Club Despite their downsides, proxy wars represent an important part of shareholder rights.  |
IEEE Spectrum November 2005 Amy D. Wohl |
Interface Lift User interfaces for Internet browsers get an extreme makeover to cope with today's torrent of information.  |
The Motley Fool April 30, 2007 Tom Taulli |
Proxy Fights 101 How shareholder skirmishes are transforming Wall Street. It's smart to understand how proxy fights work, but don't assume they're a good system for investing. Proxy battles often target struggling companies with volatile stocks.  |
Technology Research News December 1, 2004 |
Multicamera Surveillance Automated Researchers have developed a multi-camera surveillance system that allows the user to indicate an object in one view and automatically zoom to that object in all other views.  |
Linux Journal March 2001 Ian Spare |
Deploying the Squid proxy server on Linux Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate Proxy Server...  |
Information Today December 13, 2010 |
Serials Solutions Announces Hosted Proxy Service It is the industry's first Software as a Service (SaaS) proxy solution designed to help librarians streamline the management of their e-resource collections, as well as improve patron access to those collections with a single sign-on.  |
Financial Advisor January 2006 Joel Bruckenstein |
Proxy Problems Simplified The Web-based PROXY Governance platform is a a technological solution for financial advisors' proxy-voting woes.  |
The Motley Fool May 25, 2004 Chris Mallon |
A Proxy for Management The proxy statement gives investors an annual glimpse into the minds of management.  |
D-Lib June 2001 John S. Erickson |
A Digital Object Approach to Interoperable Rights Management Fine-grained policy enforcement enabled by a digital object infrastructure...  |
InternetNews January 29, 2009 Sean Michael Kerner |
Security Players Take Aim at Anonymous Proxies What your users are hiding could hurt your network.  |
The Motley Fool December 14, 2011 Alyce Lomax |
Making Corporate Housecleaning Easier in 2012 Proxy access resolutions pile up; could some corporate boards get cleaned up next year?  |