Welcome!


Vol: 6 Iss: 5

Read Back Issues

My column two months ago, 'Sunset on the Evil Empire,' stirred up a great deal of controversy. Part of it was my fault, as I was trying to make two distinct points in the article, and that elicited a great deal of excitement directed at one point or the other. My first point, which I m...
Every software system has logging requirements so application processing can be monitored and tracked. Modern distributed systems, which are usually based on application frameworks, require a logging solution that can cope with multiple processes on multiple hosts sending logging infor...
Most companies have a large investment in legacy systems for ERP, transaction processing, and database applications. Everyone's talking about how they can leverage these systems and integrate them into their modern, multitier, e-business application architectures.
ZeroCode is a Web-based development environment that allows a team to graphically develop a Web-based database application with minimal handwritten code. The development environment is Web-based and housed on zeroCode servers. Developers build the application via the Web interface and ...
A Client Company implements an archive-downloading package. It downloads presentation archives from its providers, Server Companies 1 and 2. Server Company 1 archive includes Enterprise JavaBean client code; Server Company 2 includes Java Message Service (JMS) client code. The archives...
Connectivity changes everything, especially with embedded computing technology. Since we're entering a world in which things will link and think, it's clear that many new projects will begin to incorporate more advanced and sometimes complex technology.
Database Programming with JDBC and Java by George Reese Published by O'Reilly & Associates
Last month in JDJ (Vol. 6, issue 4) I introduced the topic of object/relational mapping. Databases such as Oracle8i or DB2 store data in tables and columns. Thus, customer data is stored in a 'customer' table and information relevant to the customer such as ID, name, and address are st...
In this new era of rapid application development (RAD), there's an ever-increasing push to get applications into production without adequate testing. This methodology does meet deadlines, but it can also lead to serious implications for your business's future. For example, many Interne...
Telephone access to the Web is the latest craze sweeping the dot-com landscape. Voice portals with names like BeVocal, Quack.com, Tellme, and AudioPoint are promising all callers easy access to news, traffic reports, stock quotes, and driving directions. Some of these services may flas...
In Part 1 of this series (JDJ Vol. 6, issue 4) I developed a simple access control mechanism for my application using HTTP authentication and servlets. In my view, servlets have always been underrated as a technology.
Last month when I sat down to write this editorial I had the good fortune to be staring out at the Golden Gate Bridge. Sadly, this month the view isn't quite as romantic; I'm sitting approximately 12 inches away from an elderly lady who has decided to push her seat back, reducing my ai...
Have you ever needed to write a simple graphical user interface (GUI) but didn't have the right kind of layout manager? Do you hate to use a layout manager that takes you longer to understand than to make your GUI? If this is the case, you're probably not a big fan of the GridBagLayout...
XML gets mentioned a lot as an interoperability 'platform.' By itself, of course, XML can't be a platform because it's a document format. It may be flexible, human-readable, dynamic, popular, and cool because it looks a lot like HTML, but it's still just a document format, and there ar...
What is a facade? In software engineering it's a design pattern. One possible definition of a facade is: 'A higher-level interface that provides a unified way of accessing a subsystem and as a result makes the subsystem easier to use.'
The Java Message Service (JMS) is a specification put forth by Sun to define a common set of APIs and common semantics for messaging-oriented middleware providers. An increasing number of MOM vendors have embraced this specification, and new vendors are building messaging products suit...
This article presents a design approach for multitier applications implemented with Enterprise JavaBeans. These entity EJBs inherit bulk set-and-get methods from a single parent class that takes advantage of the java.lang.reflect package. This approach reduces the number of network rou...
In the March issue of JDJ (Vol. 6, issue 3) we discussed the basics behind J2EE security, including coverage of role-based security for both the Web and EJB tiers. In Part 2, we provide an example of implementing J2EE security in the WebLogic Server.
Remember the old axiom, Be careful what you ask for, you just might get it? That's what happened with the Abstract Windowing Toolkit (AWT), GUI controls, and threading. Developers were tired of always worrying about multithreaded access to GUI elements, so it sounded like a good idea t...
As staffing professionals we read a lot of résumés. The most common problem is that they misrepresent candidates as being more skilled and experienced than they really are...or, worse, they misrepresent seasoned candidates as less experienced than they are. A good r&eacut...