/**

popular collection of scripts for all

*/
/** Search */

Miscellaneous

 }

The Jxta command shell

Hits: 787
*****
0.0
Java 2D may be the most
Learn how to create
Project Jxta is a
The invention of the internet
obvious solution for
digital-certificate chains
community-run attempt to
and web browsers has had a
programming 2D graphs in
to test your software. IBM
build a utility application
massive impact on the way
Java programs, but it's not
Software Engineer, Paul H.
substrate for peer-to-peer
people send and receive
the only one. This article
Abbott, clarifies this
applications. The initial
information. If you are like
proposes an elegant
seldom-documented process by
reference implementation of
many people, you probably
alternative in the form of
showing you how to use the
Jxta includes a command-line
get your news and other
Java Objects for Science
freely available OpenSSL
shell that allows
important information from
(JSci), an open-source
toolkit to create a
experimentation with the
the internet.
package that lets you create
certificate chain of any
core Jxta platform without
 
2D bar graphs, pie charts,
length. He also describes
programming. This article
 
and line graphs in Swing.
common certificate
takes us through a hands-on
 
 
attributes and shows you
tour of the <a
 
 
some sample Java code for
 
 
 
reading the certificates you
 
 
 
create into a Java keystore.
 
 


Date: Oct, 09 2001


Date: Aug, 25 2004


Date: Sep, 11 2001


Date: Jul, 17 2006
Radio Frequency
This article leads you into
If you're looking for a
Add more versatility to your
Identification, also known
the gray zone between
unique programming
existing Java framework. The
as RFID, is a tool which is
modeling and method, with a
challenge, try your hand at
same framework supports file
being used in a large number
look at requirements
building a management
access, network access,
of industries. There are a
gathering via use case
application for a
character conversion,
number of software programs
modeling. In particular,
distributed, cross-platform
compression, encryption and
which can work with RFID,
this article focuses on the
network. This article is the
so forth. This article
and an example of this is
relationship between user
first in a three-part series
presents a framework that
RFID Anywhere by Sybase
interfaces, system
that looks at how Sun
lets an application
iAnywhere. It was designed
interfaces, and use case
Microsystems's Jiro
efficiently read data from a
using a .NET program that
descriptions.
technology and the
source that only supports
has greatly modified the
 
Distributed Management Task
writing data to an output
different phases of their
 
Force's Web-Based Enterprise
stream.
RFID projects.
 
Management Initiative (WBEM)
 
 
 
can simplify the creation of
 
 
 
management applications for
 
 
 
heterogeneous environments.
 


Date: Jul, 17 2006


Date: Jun, 26 2001


Date: Jun, 01 2001


Date: Jul, 11 2002
{ Copyright } ©2019 NuclearScripts.com