Win a copy of Event Streams in Action this week in the Java in General forum!

D Tom

Greenhorn
+ Follow
since Feb 03, 2012
Cows and Likes
Cows
Total received
0
In last 30 days
0
Total given
0
Likes
Total received
2
Received in last 30 days
0
Total given
0
Given in last 30 days
0
Forums and Threads
Scavenger Hunt
expand Ranch Hand Scavenger Hunt
expand Greenhorn Scavenger Hunt

Recent posts by D Tom

Chapter 8, self test question 3.

Which invocation(s) will produce the output: 0 2 4 8 ?

The correct answer in the self test answers is B which is java Quetico "\B" "^23 *$76 bc"

But when I tried this, I got 0 2 4 5 7 10.



So I think the answer should be E, none of the above.
Hi Craig,

I'm developing a single page application using angular.js and it communicates with the server using REST web services. I'm new to spring and wondering if I should use spring REST services or JAX-RS. What are the pros and cons for both?
4 years ago
Hi Jim,

To give a more clear picture, it's a single page web application using angular.js that consumes REST services in the server (jax-rs or spring mvc). I'm planning to use OpenID for authentication.
4 years ago
Hi Jim, August,

Are there any techniques available to authenticate REST web services other than http basic authentication?
4 years ago
Hi

I'm extending the java.net.Authenticator and installing the sub class as default authenticator for NTLM authentication in my web service client.

Authenticator.setDefault (authinstance);

My question is: Will this affect other java programs executing in the same jvm? Meaning if another java program wants to authenticate to a different url, will there be a problem?

Is there a way to set the authenticator for each program?

Thanks in advance for your responses.
7 years ago
I'm planning to create a file encryption application consisting of separate classes for the different activities like file/directory navigation, key management, actual encryption/decryption etc.

For key management, I'm creating a helper class called KeyManager that takes care of all key related activities like generating and storing symmetric keys, key pairs, generating and loading new key stores etc. All methods in this class are currently public and static so that I don't need to create an instance of KeyManager class to access its methods. I'm wondering if this approach has any drawbacks. Is there any advantage in converting all methods to non-static and creating an instance of KeyManager class to access its methods?

7 years ago
Thank you all for your replies and the learning material links.
7 years ago
JSP
Hi experts,

I'm planning to develop a basic web-based SQL client application that can connect to a database server, send SQL statements from the browser to the database server and display the results from the database server in the browser.

I think there should be a 3 - tier architecture. Browser - Application Server - Database Server to accomplish this.

I have knowledge of core java and jdbc, but don't not much about server side programming.

I need guidance as to how to start on this project. What all java server technologies I need to learn at a minimum in order to achieve this?

Thanks in advance.
D Tom



7 years ago
JSP