Jdjedge Conference & Expo Final Program Inside P.91

Total Page:16

File Type:pdf, Size:1020Kb

Jdjedge Conference & Expo Final Program Inside P.91 JDJEDGE CONFERENCE & EXPO FINAL PROGRAM INSIDE P.91 TM Java COM FINAL CONFERENCE PROGRAM INSIDE PAGE 91 Q&A: An Interview with Jason Hunter Alan Williamson 9 From the Editor Open sourcing Java – what it means to developers Alan Williamson pg. 7 Interfaces: Combining RMI with SOAP Samudra Gupta J2EE Editorial Develop a framework that SOAP-enables RMI services 16 Ajit Sagar pg. 12 J2SE Editorial Feature: Spread Your Wings with Cocoon David Rosenstrauch Keith Brown pg. 42 An innovative and powerful tool for content site developers 28 J2ME Editorial Java Systems: Broken Windows in the Java World Joe Xu Jason R. Briggs pg. 66 The Java bug’s evil twin and how it impacts your system 44 Career Opportunities Bill Baloglu & Billy Palmieri JNI Techniques: Using the Java Native Andrew J. Chalk pg. 112 Interface Productively Simplify repetitive tasks 58 Cubist Threads Blair Wyman pg. 114 Wireless Music:Whole House Audio from Bill Ray RETAILERS PLEASE DISPLAY the Palm of Your Hand It’s only the beginning 68 UNTIL AUGUST 31, 2002 Feature: Adding Commands to Fred Daoud Displayable Components ...the object-oriented way 74 MIDP: Programming Games in J2ME Sami Lababidi The battle for market share in the MIDP games arena 86 SYS -CON Michael Barlotta MEDIA Java Techniques: Java Design Using interfaces and abstract classes to create flexible code 94 Sonic Software Zero G www.sonicsoftware.com www.zerog.com 2 JUNE 2002 JUNE 2002 3 Java COM Java COM Apple Apple Computer, Inc. Computer, Inc. www.apple.com/macosx www.apple.com/macosx 4 JUNE 2002 JUNE 2002 5 Java COM Java COM FROMF THE EDITORDI J2ME INTERNATIONAL ADVISORY BOARD • CALVIN AUSTIN (Lead Software Engineer, J2SE Linux Project, Sun Microsystems), • JAMES DUNCAN DAVIDSON (JavaServlet API/XMP API, Sun Microsystems), • JASON HUNTER (Senior Technologist, CollabNet), • JON S. STEVENS (Apache Software ALANWILLIAMSON EDITOR-IN-CHIEF Foundation), • RICK ROSS (President, JavaLobby), • BILLROTH (Group Product Manager, Sun Microsystems), • BILL WILLETT (CEO, Programmer’s Paradise) • BLAIR WYMAN (Chief Software Architect IBM Rochester) EDITORIAL J2SE EDITOR-IN-CHIEF: To Our CFML Friends: ALAN WILLIAMSON EDITORIAL DIRECTOR: JEREMY GEELAN EXECUTIVE EDITOR: NANCY VALENTINE J2EE EDITOR: AJIT SAGAR J2ME EDITOR: JASON R. BRIGGS We Welcome You J2SE EDITOR: KEITH BROWN PRODUCT REVIEW EDITOR: JIM MILBERY FOUNDING EDITOR: SEAN RHODY “ ly me to the moon...let me walk Keep your eyes open. Look outside your Java among the stars” or at least America. I circle and ask those who haven’t the in-depth PRODUCTION Fam at present sitting in a Continental knowledge you have what their perception of Java J2EE VICE PRESIDENT,PRODUCTION AND DESIGN: JIM MORGAN plane flying over the beautiful Scottish is. I think you’ll be surprised by the responses. ASSOCIATE ART DIRECTOR: LOUIS F. CUFFARI islands, sun beaming in through the window, The CFML language has enjoyed years of EDITOR: M’LOU PINKHAM contemplating the week ahead of me. My success as a server-side application imple- MANAGING EDITOR: CHERYL VAN SISE ASSOCIATE EDITORS: JAMIE MATUSOW destination is Toronto where I will be attend- mented in C/C++. Therefore, the move to the GAIL SCHULTZ ing the CFML conference, CFNORTH. Java platform is a controversial one, raising JEAN CASSIDY It has been very interesting to watch how an eyebrow or two within CFML’s loyal user Home ASSISTANT EDITOR: JENNIFER STILLEY the CFML community is reacting to the Java base. The posts by respected CFML people ONLINE EDITOR: LIN GOETZ releases. Their responses serve to illustrate regarding the move to Java are startling; I TECHNICAL EDITOR: BAHADIR KARUV, PH.D. the point I have been banging on about for urge you to check out the official CFML mail- WRITERS IN THIS ISSUE the last few months: outside of the Java com- ing list archives for examples of posts that BILL BALOGLU, MICHAEL BARLOTTA, JASON R. BRIGGS, KEITH BROWN, munity, we still have a long way to go in the will send your blood racing. BEA ANDREW CHALK, FRED DAOUD, SAMUDRA GUPTA, JEFF HEATON, education and perception of our beautiful We have a barrage of posts from people SAMI LABABIDI, BILLY PALMIERI, BILL RAY, DAVID ROSENSTRAUCH, language. Allow me to give you another berating Java, claiming it could never be as AJIT SAGAR, ALAN WILLIAMSON, BLAIR WYMAN, JOE XU example of ignorance. As luck would have it, fast as a native implementation, and it’s no the May issue of the in-flight magazine has wonder CFMX is running slow. I’m assuming www.bea.com/download SUBSCRIPTIONS: an article on Web technologies. This article these people haven’t given CFMX a chance. FOR SUBSCRIPTIONS AND REQUESTS FOR BULK ORDERS, is, of course, aimed at the masses, but let me In our tests, CFMX outperforms the CF5 ver- PLEASE SEND YOUR LETTERS TO SUBSCRIPTION DEPARTMENT give you its paragraph on what JSP is: sion running on the same hardware. So SUBSCRIPTION HOTLINE:[email protected] where these people are getting their facts COVER PRICE: $5.99/ISSUE Like ASP, a specification that allows a from is beyond me. DOMESTIC: $49.99/YR. (12 ISSUES) browser to ask the database for information. What has happened is that the old CANADA/MEXICO: $79.99/YR. OVERSEAS: $99.99/YR. For example, people play games against each Chinese whispers network has begun. The (U.S. BANKS OR MONEY ORDERS). BACK ISSUES: $10/EA., INTERNATIONAL $15/EA. other on the Internet on JSP pages. focus of conversation has moved from CFML EDITORIAL OFFICES: Advantages: works well behind the scenes. to whether or not Java is up to the task. We all SYS-CON MEDIA 135 CHESTNUT RIDGE RD., MONTVALE, NJ 07645 Disadvantages: whereas ASP pages are pro- know that Java is more than up for the job of TELEPHONE: 201 802-3000 FAX:201 782-9600 grammed with PERL, JSP pages are pro- serving dynamic content; this was its calling JAVA DEVELOPER’S JOURNAL (ISSN#1087-6944) is published monthly grammed with a very specific set of tools – one and this is where Java is making serious (12 times a year) for $49.99 by SYS-CON Publications, Inc., 135 Chestnut Ridge Road, Montvale, NJ 07645. Periodicals postage rates are paid at for which it may be harder to find expert headway, at the server side. Montvale, NJ 07645 and additional mailing offices. POSTMASTER: Send address maintenance. Although it appears as if we, the Java changes to: JAVA DEVELOPER’S JOURNAL, SYS-CON Publications, Inc., —Continental, May 2002 community, are the only people who really 135 Chestnut Ridge Road, Montvale, NJ 07645. know this for sure. Our message doesn’t ©COPYRIGHT: Read it? Do me a favor, read it again. seem to be getting out there. Copyright © 2002 by SYS-CON Publications, Inc. All rights reserved. What do you think? Not really selling JSP is There’s a huge movement within the No part of this publication may be reproduced or transmitted in any form or by any it? In fact, you would probably get a bad feel- CFML community to come to Java and sit at means, electronic or mechanical, including photocopy or any information storage and ing about JSP. As we know, the author is our table to share in the delights we offer. retrieval system, without written permission. For promotional reprints, contact reprint coor- wrong; if anything JSP is the easiest way to This is wonderful and we welcome and dinator Carrie Gebert, [email protected]. SYS-CON Publications, Inc., reserves the right to revise, republish and authorize its readers to use the articles submitted for publication. get your hands on Java – no compiling, just encourage our new developers. save and surf! How difficult is that I ask you? More power to you. Java and Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries. SYS-CON Publications, Inc., is independent of Sun Microsystems, Inc. All brand and product names used on these pages are trade names, [email protected] service marks or trademarks of their respective companies. AUTHOR BIO Alan Williamson is editor-in-chief of Java Developer’s Journal. During the day he holds the post of chief technical officer at n-ary (consulting) Ltd, one of the first companies in the UK to specialize in Java at the server side. Rumor has it he welcomes all suggestions and comments. 6 JUNE 2002 JUNE 2002 7 Java COM Java COM An Interview with Jason Hunter J2ME Open sourcing Java – a Q&A session J2SE Two: “Is the reference implementation for Java (the JDK) available as open source?” This agreement does not address JDJ caught up with Jason Hunter, Apache that. Apache doesn’t believe in telling Sun or anyone else what Software Foundation vice president, after JavaOne to discuss the license their code must be under. What Apache believes is that if major announcement regarding the controversial issue of open you don’t like a code license, you must have the ability to code it sourcing Java. Jason holds a seat on the JCP Executive yourself. The purpose of this agreement is to allow that. Committee overseeing the Java platform. Three: “Will Java be developed following the open source JDJ asked readers to pose their questions to Jason, so you method?” Right now there’s a formal process by which Java J2EE can hear it straight from the horse’s mouth! specifications are created within the Java Community Process (JCP). The JCP will probably remain as a formal specification- creating body, although Apache hopes it will become more open. <alan>: What does this announcement mean? The project I lead, JDOM, is JSR number 102, and with the JSR <jason>: It heralds an agreement between Apache and Sun we’re proving you can have open development on a Java speci- regarding open source implementations of Java standards.
Recommended publications
  • User's Guide to Aolpress
    User’s Guide to AOLpress 2.0 Do-it-Yourself Publishing for the Web 1997 America Online, Inc. AOL20-040797 Information in this document is subject to change without notice. Both real and fictitious companies, names, addresses, and data are used in examples herein. No part of this document may be reproduced without express written permission of America Online, Inc. 1997 America Online, Inc. All rights reserved. America Online is a registered trademark and AOLpress, AOLserver, PrimeHost, AOL, the AOL triangle logo, My Place, Netizens, and WebCrawler are trademarks of America Online, Inc. GNN is a registered trademark, and Global Network Navigator, GNNpress, and GNNserver are trademarks of Global Network Navigator, Inc. MiniWeb, NaviLink, NaviPress, NaviServer, and NaviService are trademarks of NaviSoft, Inc. Illustra is a trademark of Illustra Information Technologies, Inc. All other brand or product names are trademarks or registered trademarks of their respective companies or organizations. Author: Yvonne DeGraw Cover Art and Illustrations: Amy Luwis Special Thanks To: Thomas Storm, Cathe Gordon, Angela Howard, George W. Williams, V, Dave Long, Dave Bourgeois, Joel Thames, Natalee Press-Schaefer, Robin Balston, Linda T. Dozier, Jeff Dozier, Doug McKee, and Jeff Rawlings. Quick Table of Contents Contents Part 1: Getting Started Welcome! 11 Chapter 1 Installing AOLpress 17 Chapter 2 Create a Web Page in 10 Easy Steps 21 Chapter 3 Browsing with AOLpress 33 Part 2: Creating Pages Chapter 4 Web Pages and What to Put in Them 45 Chapter 5 Creating
    [Show full text]
  • Instant Messaging Security
    www.dbebooks.com - Free Books & magazines Instant Messaging Security Computer Security and Computer Forensic Related Book Titles: Casey, Handbook of Computer Crime Investigation, ISBN 0-12-163103-6, 448pp, 2002. Kovacich, The Information Systems Security Officer’s Guide, ISBN 0-7506-7656-6, 361pp, 2003. Boyce & Jennings, Information Assurance, ISBN 0-7506-7327-3, 261pp, 2002. Stefanek, Information Security Best Practices: 205 Basic Rules, ISBN 0-878707-96-5, 194pp, 2002. De Clercq, Windows Server 2003 Security Infrastructures: Core Security Features, ISBN 1-55558-283-4, 752pp, 2004. Rittinghouse, Wireless Operational Security, ISBN 1-55558-317-2, 496pp, 2004. Rittinghouse & Hancock, Cybersecurity Operations Handbook, ISBN 1-55558-306-7, 1336pp, 2003. Ransome & Rittinghouse, VoIP Security, ISBN 1-55558-332-6, 450pp, 2005. Speed & Ellis, Internet Security, ISBN 1-55558-298-2, 398pp, 2003. Erbschloe, Implementing Homeland Security for Enterprise IT, ISBN 1-55558-312-1, 320pp, 2003. Erbschloe, Physical Security for IT, ISBN 1-55558-327-X, 320pp, 2005. XYPRO, HP NonStop Server Security, ISBN 1-55558-314-8, 618pp, 2003. For more information, visit us on the Web at http://books.elseiver.com/. Computer Security and Computer Forensic Related Products: Newsletters and Journals from Elsevier: Digital Investigation – New in 2004 Edited by Eoghan Casey, this new peer reviewed journal focuses on best practice, new developments and proven methodologies in the field of digital forensic science. For further information, please visit: http://www.compseconline.com/digitalinvestigation/ • Biometric Technology Today • Card Technology Today • Computer Fraud & Security • Computer Law and Security Report • Computers & Security • Information Security Technical Report • Network Security • Infosecurity Today For more information, visit us on the Web at http://www.compseconline.com/.
    [Show full text]
  • Webdav a Network Protocol for Remote Collaborative Authoring on the Web E
    WebDAV A network protocol for remote collaborative authoring on the Web E. James Whitehead, Jr.† & Yaron Y. Goland‡ †Dept. of Info. and Computer Science, U.C. Irvine, USA, [email protected] ‡Microsoft Corporation, Redmond, WA, USA, [email protected] Abstract. Collaborative authoring tools generate network effects, where each tool’s value depends not just on the tool itself, but on the number of other people who also have compatible tools. We hypothesize that the best way to generate network effects and to add collaborative authoring capability to existing tools is to focus on the network protocol. This paper explores a protocol-centric approach to collaborative authoring by examining the requirements and functionality of the WebDAV protocol. Key features of the protocol are non- connection-oriented concurrency control, providing an upward migration path for existing non-collaborative applications, support for remote manipulation of the namespace of documents, and simultaneous satisfaction of a wide range of functional requirements. Introduction Despite many compelling research examples of collaborative authoring, so far their impact on actual authoring practice has been limited. While BSCW (Bentley et al., 1997) and HYPER-G (Maurer, 1996) have developed communities of use, electronic mail remains the dominant technology used for collaborative authoring, mainly due to its ubiquity. In order to perform collaborative authoring, all collaborators need to use compatible authoring tools—typically all collaborators use the same tools, tailor- made to support collaboration. To collaborate using PREP (Neuwirth et al., 1994), all collaborators need to use PREP, likewise for GROVE (Ellis et al., 1989) and DUPLEX (Pacull et al., 1994).
    [Show full text]
  • Malicious Threats and Vulnerabilities in Instant Messaging
    WHITE PAPER Symantec Security Response Malicious Threats and Vulnerabilities in Instant Messaging By Neal Hindocha and Eric Chien Symantec Security Response Symantec Corporation INSIDE INSIDE∆ Instant Messaging Architecture ∆ Malicious Threats to Instant Messaging ∆ Vulnerabilities and Blended Threats ∆ Information Disclosure Originally published in Virus Bulletin International Conference, September 2003. Copyright held by Virus Bulletin, Ltd., but is made available free of charge by ∆ Password Theft permission of Virus Bulletin. For more information on Virus Bulletin, ∆ Current and Future Solutions please visit http://virusbtn.com/ Symantec MALICIOUS THREATS AND VULNERABILITIES IN INSTANT MESSAGING Contents Abstract & Preface . .3 Instant Messaging Architecture . 4 User Verification . 5 Data Encryption and Authentication . 6 Enterprise Editions . 6 Programmability . 6 Malicious Threats to Instant Messaging . 7 Backdoor Trojan Horses . 10 Vulnerabilities and Blended Threats . 10 Information Disclosure . .14 Password Theft . 16 Current and Future Solutions . 18 Antivirus . 20 Summary . 21 References . 22 About the Authors . 23 Symantec MALICIOUS THREATS AND VULNERABILITIES IN INSTANT MESSAGING √ Abstract Instant messaging is an up and coming threat as a carrier for malware. More and more people are using instant messaging, both for personal and business reasons. Instant messaging networks provide the ability to not only transfer text messages, but also transfer files. Consequently, instant messengers can transfer worms and other malware. Furthermore, multiple vulnerabilities have been discovered and have yet to be discovered in instant messaging clients. Such vulnerabilities not only give hackers remote access, but also provide access to fast spreading blended threats. Current blended threats are limited by their ability to find vulnerable hosts, but with instant messaging buddy lists, finding vulnerable hosts becomes significantly easier resulting in a blended threat that may propagate faster than CodeRed and Slammer.
    [Show full text]
  • An Analysis of Instant Messaging and E- Mail Access Protocol Behavior in Wireless Environment
    An Analysis of Instant Messaging and E- mail Access Protocol Behavior in Wireless Environment IIP Mixture Project Simone Leggio Tuomas Kulve Oriana Riva Jarno Saarto Markku Kojo March 26, 2004 University of Helsinki - Department of Computer Science i TABLE OF CONTENTS 1 Introduction ..................................................................................................................................... 1 PART I: BACKGROUND AND PROTOCOL ANALYSIS ............................................................. 1 2 Instant Messaging............................................................................................................................ 1 3 ICQ.................................................................................................................................................. 3 3.1 Overview ................................................................................................................................. 3 3.2 Protocol Operation .................................................................................................................. 4 3.2.1 Client to Server................................................................................................................4 3.2.2 Client to Client ................................................................................................................5 3.2.3 Normal Operation............................................................................................................ 5 3.2.4 Abnormal Operation.......................................................................................................
    [Show full text]
  • Messing with the Magic PART TWO - the Google Story
    Table of Contents Title Page Copyright Page Dedication PREFACE PART ONE - Different Planets CHAPTER ONE - Messing with the Magic PART TWO - The Google Story CHAPTER TWO - Starting in a Garage CHAPTER THREE - Buzz but Few Dollars CHAPTER FOUR - Prepping the Google Rocket CHAPTER FIVE - Innocence or Arrogance? CHAPTER SIX - Google Goes Public CHAPTER SEVEN - The New Evil Empire? PART THREE - Google Versus the Bears CHAPTER EIGHT - Chasing the Fox CHAPTER NINE - War on Multiple Fronts CHAPTER TEN - Waking the Government Bear CHAPTER ELEVEN - Google Enters Adolescence CHAPTER TWELVE - Is "Old" Media Drowning? CHAPTER THIRTEEN - Compete or Collaborate? CHAPTER FOURTEEN - Happy Birthday PART FOUR - Googled CHAPTER FIFTEEN - Googled CHAPTER SIXTEEN - Where Is the Wave Taking Old Media? CHAPTER SEVENTEEN - Where Is the Wave Taking Google? Acknowledgements NOTES INDEX ALSO BY KEN AULETTA Media Man: Ted Turner's Improbable Empire Backstory: Inside the Business of News World War 3.0: Microsoft and Its Enemies The Higbwaymen: Warriors of the Information Superhighway Three Blind Mice: How the TV Networks Lost Their Way Greed and Glory on Wall Street: The Fall of the House of Lehman The Art of Corporate Success: The Story of Schlumberger The Underclass Hard Feelings The Streets Were Paved with Gold THE PENGUIN PRESS Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, U.S.A. Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario, Canada M4P 2Y3 (a division of Pearson Penguin Canada Inc.). Penguin Books Ltd, 80 Strand, London WC2R ORL, England. Penguin Ireland, 25 St. Stephen's Green, Dublin 2, Ireland (a division of Penguin Books Ltd).
    [Show full text]
  • Copyrighted Material
    27_597582_bindex.qxd 8/5/05 10:15 PM Page 585 Index NUMERICS AmazonSearchScraper class, 405–406 0.3 specification, Atom, 39, 211 AmazonWishlistScraper class, 409–411 1.0 specification, RSS, 39 America Online Instant Messenger. See AIM (AOL 2.0 specification, RSS, 39 Instant Messenger) 4Suite package, 20–21, 433 AmphetaDesk feed aggregator, 8 AmphetaRate service, 481 A AOL Instant Messenger. See AIM “A Plan for Spam” (Graham), 451 Apache Web server access logs, Apache, 304–312 compression, enabling, 231–232 ACCESS_LOG constant, 305 conditional GET, enabling, 235–236 ACCESS_RE constant, 310 configuring MIME types for feeds, 25 Active Channels, Internet Explorer, 4 monitoring access logs, 304–312 addConnection() method, 117–118 monitoring error logs, 301–304 addTrack() method, 192 API_BLOGID constant, 525 AddType configuration, Apache, 25 API_PASSWD constant, 525 AdiumX IM client, 105 API_URL constant, 525 Advanced Packaging Tool, Debian Linux, 18 API_USER constant, 525 agg01_pollsubs.py program, 52–59 append_entry() method, 297–298 agg01_subscribe.py program, 50–51 AppleScript agg02_pollsubs.py program, 68–77 accessing from Python, 160 agg03_emailsubs.py program, 80–86 importing MP3s into iTunes, 189–194 agg04_emailsubs.py program, 86–91 application ID, Yahoo! Web services, 384–385, 387 agg05_im_subs.py program, 105–111 ARCHIVE_FN constant, 517 agg06_aggbot.py program, 114–124 ASSOCIATE_TAG constant, 508–509 AggBot class, 116–124 “ATOM 0.3” links, 23 agglib.py module, 77–79, 112–114, 145–146 Atom feeds. See also feeds aggregator. See feed
    [Show full text]
  • Comparison of Different Ways to Avoid Internet Traffic Int…
    José López Luque Comparison of Different Ways to Avoid Internet Traffic Interception Trondheim, September 2010 Comparison of Different Ways to Avoid Internet Traffic Interception José López Luque Master’s thesis Submission date: September 2010 Professor: Stig F. Mjølsnes Supervisor: Svein Y. Willassen Norwegian University of Science and Technology Department of Telematic Engineering Problem Description The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping by the governments (we have the Swedish example with the FRA-Law, but is also extensible to other countries, like China). It will begin with a general overview of the countries involved, their interception laws, the main reasons that motivated these laws and their social implications. The further analysis will consist on a description of the technologies involved in each option as well as the difficulties to implement them and the technical knowledge of the users in order to take profit of them. Assignment given: 27. January 2010 Professor: Stig F. Mjølsnes To my family, with love Abstract As telephone conversations have moved to the Internet, so have those who want to listen in. But the technology needed to do so would entail a dangerous expansion of the government's surveillance powers. Internet users are watching how their privacy is slowly being undermined with justifications of national security and anti-terrorist purposes. This surveillance is justified or not, users must know what options are available to them to protect their privacy. The main objective of this thesis is to analyze and compare different ways to avoid the Internet traffic eavesdropping (carried out both by governments or malicious particulars).
    [Show full text]
  • Instant Paranoia Konstantin Klyagin
    Instant Paranoia Konstantin Klyagin English version of an article published in "Hakin9" Magazine issue 3/2004 All rights reserved. You are allowed to distribute this document pending no modification is made to its contents. “Hakin9” Magazine, Wydawnictwo Software, ul. Lewartowskiego 6, 00-190 Warszawa, [email protected] Instant Messenger security Instant Paranoia Konstantin Klyagin Talking every day on your favorite instant messaging networks with friends, lovers, colleagues and partners, have you ever thought if your conversations can be intercepted and become exposed to someone who can use them with some evil intentions? here are many instant messaging existing protocols. There are messages sent systems with different features and through the server (client -> server -> client), Tcapabilities. Their security properties and those that are sent directly (client -> client, are also different and it’s obvious that one are also known as peer to peer). Peer to peer is more secure than others. We’ll take a look at quite a common way of direct communications the major players on the IM market, see what between two clients, though it is not supported vulnerabilities they have and using which of in all of IM systems. These are used when one of them you must be the most paranoid. the clients can connect to another one, knowing their IP address. Due to specific network setup Basics or a firewall such connections are possible not Imagine you came back from your job, sit down to reach the destination. In this case, fallback to comfortably at your computer and open your the through-server scheme is usually made.
    [Show full text]
  • Defining a Software Analysis Framework
    School of Mathematics and Systems Engineering Reports from MSI - Rapporter från MSI Defining a Software Analysis Framework Oguzhan Dogan MSI Report 08079 Aug Växjö University ISSN 1650-2647 2008 SE-351 95 VÄXJÖ ISRN VXU/MSI/DA/E/--08079/--SE Acknowledgement Thanks to… ... Professor Welf Löwe and other developers of VizzAnalyzer, … Mathias Hedenborg for his lectures, …Rudiger Lincke for his lectures and providing me with inspiring notes and interesting new ideas for my project, ... Jesper Andersson for his lectures, ...My good class mates who attended the same course with me. Växjö, May 2008 i Abstract Nowadays, assessing software quality and making predictions about the software are not possible. Software metrics are useful tools for assessing software quality and for making predictions. But currently the interpretation of the measured values is based on personal experience. In order to be able to assess software quality, quantitative data has to be obtained. VizzAnalyzer is a program for analyzing open source Java Projects. It can be used for collecting quantitative data for defining thresholds that can support the interpretation of the measurement values. It helps to assess software quality by calculating over 20 different software metrics. I define a process for obtaining, storing and maintaining software projects. I have used the defined process to analyze 60-80 software projects delivering a large database with quantitative data. Keywords: SourceForge.NET, Software Metrics, VizzAnalyzer. ii Table of Contents 1.Introduction....................................................................................................................1
    [Show full text]
  • Next Generation Massive Multiplayer Games in a Mobile Context
    Freie Universität Berlin Fachbereich Informatik und Mathematik AG Technische Informatik Dipl. Inform. Dipl. Kaufm. Tobias Fritsch DOCTORAL DISSERTATION Dissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften im Fachbereich Mathematik und Informatik der Freien Universität Berlin Next Generation Massive Multiplayer Games in a Mobile Context Eingereicht bei: Prof. Dr.-Ing. Jochen Schiller Prof. Dr. Mark Claypool Dipl. Inform. Dipl. Kaufm. Tobias Fritsch Matr.-Nr. 3581795 Anschrift Angermünder Straße 1a 12305 Berlin Tel. 030 74682460 E-Mail [email protected] Ort/Datum Berlin, den 22.09.2007 Gutachter: Prof. Dr.-Ing. Jochen Schiller Prof. Dr. Ing. Knut Reinert Prof. Dr. Günter Rote Dr. Achim Liers Prüfungsdatum der letzten Prüfung: 29.05.2008 I Acknowledgements The work in this thesis presents the results of my scientific studies as a PhD student at the Freie Universität Berlin. Research was mainly conducted by the mobile gaming workgroup, which is a project of the Freie Universität Berlin’s computer science department. I would like to take this opportunity to thank everyone for supporting me during this time. First of all, I owe my deepest gratitude to Prof. Jochen Schiller, who was the primary adviser of this doctorial dissertation. His immense motivation always encouraged me to continue working unrelentlessly in order to achieve the scheduled tasks. By providing me with tremendous flexibility during my first three years, he further supported my inspiration and therefore significantly helped to complete this work. His knowledge of and insight into technical computer science is remarkable; he always managed to maintain an overview of the large scope of this work.
    [Show full text]