Yikes! Your application just failed three performance requirements in QA. Is it your database? Is it your application? What is it? Before you begin the usual hair on fire drills tuning the parameters, rebuilding the indexes, removing them, and throwing more hardware at the problem attend this webinar: Deploy Top-Performing Java or SQL Code with J Optimizer and DB Optimizer Free Webinar Wednesday, April 8, 2009 11:00 AM PDT / 2:00 PM EDT Register Now! At this Webinar you will learn how to: â€¢ Find and fix performance problems in your Java code earlier in the development process. â€¢ Quickly pinpoint, down to the line of code, memory and CPU bottlenecks in your Java application. â€¢ Profile the performance behavior of your Java EE application and identify performance bottlenecks across Java EE protocols and components. â€¢ Uncover inefficiencies in your SQL queries to prevent poor-performing SQL from reaching the production environment. Learn how you can more easily and quickly prevent, find, and fix problems that impact Java application and database performance throughout the development cycle and even post-deployment.
Product Description The book has been written to provide genuine domain knowledge to programmers who wish to learn Java server-side, web-based application development, using Java EE. Learning web development is done through a set of examples and hands on exercises. We hope to encourage you to strongly reinforce your skills by developing of a Personnel Management System. THE TOPICS COVERED IN THE BOOK Overview Of Java Enterprise Edition 5 Introduction To Java, System Architecture, Intro… More >>
I realised that programming in Java is quite a fun only after doing it myself. You will be amazed to know that it’s like putting different pieces of puzzle together. You put them relatively in an integrated and coherent manner. The Beauty of it is, that most of the times you dont have to create these pieces yourself. You just customize them according to your need after you get them from an already defined java class or package. It was about programming, now lets talk sumthing about sockets.
Socket is used to establish a point-to-point, bidirectional connection between two entities in a network. Just like a real world socket, it is used to plugin a connection from another source. The connection can be incoming or outgoing or both. Similar is the case at the other end. To understand these socketsÂ properly, you need to learn a bit about Operating System and its Networking Protocols. Sockets are basically of three types: 1)UNIX Domain Sockets; 2) Internet Domain Sockets; 3) NSdomain Sockets.
I’m doing my computer engineering studies in India. We aren’t taught C in extreme detail in our university. Is it crucial or will it make things easier for me in the future if I make sure I get a high level training in C at this initial stage?
Product Description This book aims serving students, developers, technical leads and to some extent project managers or consultants by demonstrating a structured documented modestly sized project. Learning the project development and documentation is done through the construction of an Online Car Rental System using MySQL Community Server as the data store with Java Server Pages as the delivery mechanism, Struts 2 as the framework, JPA as the Specification and Hibernate 3 as the Implem… More >>
Security plays a significant role in our day to day life. So far software applications are concerned, security of data is required for authentication and for several validations. Normally while developing the applications, we use the concept of cryptography for password encryption and decryption. Some applications require more security, so they go for high end security system like trusted security certificates. The security mainly focuses on the integrity of the data at the several ends.
Technicalities For data security Java Cryptography provides a suitable framework to implement several kinds of cryptography. However there are basically two types of cryptography. Once is Symmetric Cryptography and Asymmetric Cryptography. When both the ends communicate the secured data with a common key for encryption and decryption, it is called the Symmetric Cryptography. In this case a shared key is used by both the parties to encrypt and decrypt the data. However there is a problem relating to exchange of key for symmetric cryptography. To overcome this problem java provides another approach for the cryptography called Asymmetric Cryptography. In case of Asymmetric cryptography, there will be two keys unlike one key in case of symmetric cryptography. One key is called Private key and other is called Public key. These two keys are generated together and can be used for encryption and decryption. In this case the Public key is used by anyone who wishes to communicate securely with the owner of the Private key. The Private key is used by the main owner and the owner gives the Public key so that they can decrypt the data. In this article I will give you the example on Asymmetric cryptography. You can find more tutorials and concept on Sunâ€™s JCE(Java Cryptography Extension). In my next article, I will provide you the example on Symmetric cryptography.
This example is only meant for learning and not for any specific use. You can take the piece of code to test in your system to learn the above concept.
The following class is used to create the Public key and Private key. This class contains generic methods to generate the Public and Private key. If you run the testharness class, you will find the two files called â€œPublic.keyâ€ and â€œPrivate.keyâ€. Please go through the java docs mentioned in the methods.