For Loop in Java-5

[/b][/u] Introduction: In this I will discuss about for-loop, which is enhanced in Java 5. It is very useful to display elements of array/collections. Software and version used in this are: For Loop in Java 5   more [...]

Enum in Java-5

Introduction:

In this I will discuss about Enum, which is new feature of Java 5.

It used when we want to assign
value of variable from a set of values.

Software and version used in this are:
Jdk1.5.0
Notepad / Editplus

Enum in Java 5

Attachments

EJB and RMI-1

EJB and RMI RMI and EJB offer technology for the development, installation, and management of distributed Java applications in the enterprise, Java developers frequently ask whether one is a better option than the other for their given architectures. This article provides demonstrations for using RMI and EJB technologies. Since their introduction in 1997, Remote Method Invocation (RMI) and Enterprise JavaBeans (EJB) have represented a new direction in the development, installation, and management more [...]

JSP Model

JSP Model 1 and Model 2 Architecture The early JSP specifications presented two approaches for building web applications using JSP technology. These two approaches were described in the specification as JSP Model 1 and Model 2 architectures. Although the terms are no longer used in the JSP specification, their usage throughout the web tier development community is still widely used and referenced.The two JSP architectures differed in several key areas. The major difference was how and by more [...]

Applet to Applet Communication

Applet to Applet Communication The AppletContext class in the java.applet package contains the two member methods getApplet and getApplets. By using those methods, an applet can find other applets and invoke methods on them. That can only be done if the following security requirements are met: The applets originate from the same server and from the same directory on the server. The applets are running on the same page and in the same browser window. Those security restrictions may have more [...]