Eye On Performance: A Load Of Stress

2010-05-26T17:07:53+00:00 January 22nd, 2004|Java|

Intrepid optimizers Jack Shirazi and Kirk Pepperdine, Director and CTO of JavaPerformanceTuning.com, follow performance discussions all over the Internet. A recent stop on TheServerSide.com message boards revealed some questions on stress testing and load testing. Jack and Kirk examine this subject in detail and discuss how the right tool can make a load of difference in your results.

A Brief History Of Garbage Collection

2010-05-26T17:07:24+00:00 January 22nd, 2004|Java|

The Java language may be the most widely used programming language to rely on garbage collection, but it is by no means the first. Garbage collection has been an integral part of many programming languages, including Lisp, Smalltalk, Eiffel, Haskell, ML, Scheme, and Modula-3, and has been in use since the early 1960s.

Using the JMS API and XML in Content-Based Routing

2010-05-26T17:08:53+00:00 December 20th, 2003|Java, XML|

All Knowledge Management solutions face the challenge of putting the right information in front of the right people. It's possible to confront this challenge with the right technology. Todd Sundsted demonstrates how to use Java technology, the Java Message Service (JMS) API, and XML to build a messaging infrastructure that routes messages based on their content.

Trusting Your E-mail with Java Security

2010-05-26T17:09:57+00:00 December 4th, 2003|Java|

Internet transactions, especially messages, are the lifeblood of e-business. Ensuring their security is a requirement, not a luxury, for sensitive transactions. This article examines the Java technologies that developers can use to bring security to their e-business transactions, whether Internet messages or other types of operations. This article focuses on describing the security requirements and concepts, as well as demonstrating Java security technologies that can be used for authenticating and verifying the integrity of an e-mail message. This article also presents ways in which a message can be kept confidential by enshrouding its contents with secrecy.

Pass-by-value Semantics in Java Applications

2010-05-26T17:11:04+00:00 November 24th, 2003|Java|

A few months ago, developerWorks posted some excerpts from my book, Practical Java, published by Addison-Wesley. I will initially use this column on developerWorks to answer some questions asked by readers and to respond to various comments about the excerpts.

Reflecting, Introspecting, and Customizing JavaBeans

2010-05-26T17:12:13+00:00 October 9th, 2003|Java|

The Sun JDK JavaBeans API provides a framework for defining reusable software components that can be manipulated in a visual builder tool. You may have already read the developerWorks tutorial Designing JavaBeans for visual programming. This article extends your design so that visual builder tools can use reflection, introspection, or both to analyze JavaBeans and consequently to allow users to customize them. It includes an example showing how to add your beans to WebSphere AppletDesigner, where users can customize or manipulate the beans from within the tool itself using property editors or customizers you design.

Use the Finally Keyword to Avoid Resource Leaks

2010-05-26T17:15:36+00:00 September 16th, 2003|Java|

The finally keyword is the best addition to the Java exception handling model over other language's models. The finally construct enables code to execute whether or not an exception occurred. Using finally is good to maintain the internal state of an object and to clean up non-memory resources. Without finally, your code is more convoluted. For example, the following is how you must write code to free non-memory resources without the benefit of finally: