Application Development A Cocktail of Java and MCP. MCP Guru Series Dan Meyer & Pramod Nair
|
|
|
- Harold Wilson
- 10 years ago
- Views:
Transcription
1 Application Development A Cocktail of Java and MCP MCP Guru Series Dan Meyer & Pramod Nair
2 Agenda Which of the following topics can be found in an Application Development cocktail? o Calling Java from COBOL-85 o Using Java7 NIO2 features o Accessing DMSII from Java o All of the above o Some of the above o None of the above 2013 Unisys Corporation. All rights reserved. 2
3 A Cocktail of Java and MCP Calling Java from COBOL85
4 Application Development Wouldn t It Be Nice by the Beach Boys Wouldn't it be nice if we were older Then we wouldn't have to wait so long Wouldn't it be nice to live together In the kind of world where we belong You know its gonna make it that much better When we can say goodnight and stay together Wouldn t it be nice if: Your favorite programming language could be used for everything? You could find libraries that could be easily called and not support? There were an endless supply of COBOL programmers? What a Wonderful World that would be 2013 Unisys Corporation. All rights reserved. 4
5 Mixing Languages Through Libraries We Invented It Application Program Interface (Wii API) A was well documented, in-house developed standard Specific application during definition Communication over TCPIP (Socket-to-Socket) Common Object Request Broker Architecture (CORBA) A well-defined Object Management Group (OMG) standard Vendor-independent architecture and structure Communication over the Internet Inter-Orb Protocol (IIOP) Java Native Interface (JNI) A well-defined Java standard Defined for C Java DLL 2013 Unisys Corporation. All rights reserved. 5
6 COBOL???? COBOL app needs to access an Oracle database COBOL app needs to be web services enabled COBOL app needs to create a PDF file COBOL app needs to decrypt messages encrypted with COBOL app needs to 2013 Unisys Corporation. All rights reserved. 6
7 Java Invocation Interface (Jii) COBOL-85 (via ALGOL) calling Java methods Can invoke standard Java packages Usually need minimal Java code Native program is in control Uses Java as a private library JVM ends when the native program ends 2013 Unisys Corporation. All rights reserved. 7
8 Java Invocation Interface (Jii) API developed to call Java methods Simplified with com.unisys.mcp.tools.jifgen Reads Java source or class and generates entrypoint INCLUDE file Does all the dirty work of calling JNI methods Based on C JNI method definition in a generated ALGOL library Calls for identifying methods by name Calls for identifying objects by name Chatty and error prone Application JNI Interfaces JNI Proxy Lib Java Worker Java Worker Java Class JVM JProcessor 2013 Unisys Corporation. All rights reserved. 8
9 Jii Development Process Demo Create or identify a Java class with public methods Demo COBOL program needing to accessing remote database using data from a DMSII database Java application needs 3 methods Connect to the remote database getconnection() Close database connection releaseconnection() Retrieve record using key passed from COBOL-85 and compare data compareequal (int id, String word) UniverseDemo.zip Application JNI Interfaces JNI Proxy Lib Java Worker Java Worker Java Class JVM JProcessor 2013 Unisys Corporation. All rights reserved. 9
10 Jii Development Process Demo package com.unisys.mcp.universe; import java.sql.*; public class Demo { static Connection con = null; static PreparedStatement pstmt = null; static String url = jdbc:unisys:dmsql:unisys.dmsii ; public static boolean releaseconnection() { try { if (pstmt <> null) pstmt.close(); if (con <> null) con.close(); return true; } catch (SQLException seq) { sqe.printstacktrace(); return false; } } 2013 Unisys Corporation. All rights reserved. 10
11 Jii Development Process Demo public static boolean getconnection() { boolean onmcp = System.getProperty("os.name").contains("MCP"); String hostname = onmcp? EVLANMCP : ECCSK ; try { Class.forName ("com.unisys.jdbc.dmsql.driver ) url = url + resource=universedb; + host= + hostname + ;port= user=java;password=java ); con = DriverManager.getConnection (url); if (con == null) return false; pstmt = con.preparestatement ("SELECT * FROM universedb.words + where word_id =?"); if (pstmt == null) return false; return true; } catch (SQLException sqe) { sqe.printstacktrace(); return false; } } 2013 Unisys Corporation. All rights reserved. 11
12 Jii Development Process Demo public static boolean compareequal (int id, String worda) { worda = worda.trim(); try { pstmt.setint(1, id); ResultSet rs = pstmt.executequery(); if (rs.next() { String a = rs.getstring( dmsii_word_a ); if (a.compareto(worda)!= 0) { System.err.println (id + ) + a + <> + worda); return false; } } else { System.err.println (id + ) not found [ + worda + ] ); return false; } return true; } catch (SQLException sqe) { sqe.printstacktrace(); return false; } } 2013 Unisys Corporation. All rights reserved. 12
13 Jii Development Process Demo } public static void main (String args[]) { String command = select * from dmsii_words ); try { if (getconnection()) { Statement stmt = con.createstatement(); ResultSet rs = stmt.executequery(command); while (rs.next()) { int id = rs.getint ( word_id ); String worda = rs.getstring ( dmsii_word_a ); System.out.println ( ( + id + ) + worda.trim() + : + compareequal (id, worda.getbytes()) ); } rs.close(); stmt.close(); releaseconnection(); } } catch (Exception e) { ; } } 2013 Unisys Corporation. All rights reserved. 13
14 Jii Development Process Demo Run JifGen to create files to be used on MCP RUN *DIR/JRE7/BIN/MCPTOOLS ("JifGen -verbose -cobol -d /-/JAVA/USERCODE/JAVA/UD -classpath /-/JAVA/DIR/JAVA/universedemo.jar -output DEMO com.unisys.mcp.universe.demo") [Creating file /-/JAVA/USERCODE/JAVA/UD/DEMOINCL.C85_M] [Creating file /-/JAVA/USERCODE/JAVA/UD/DEMO.ALG_M] Application JNI Interfaces JNI Proxy Lib Java Worker Java Worker Java Class JVM JProcessor 2013 Unisys Corporation. All rights reserved. 14
15 Jii Development Process Demo Modify existing application to use Java methods Include sections from *DIR/JRE7/JDK/INCLUDE/JNILIB/COBOL Include sections from "DEMOINCL.C85_M CALL JNI-CREATE-JAVA-VM USING GIVING RESULT. Do work using the following generated entry points ENTRY PROCEDURE INITIALIZE-DEMO ENTRY PROCEDURE DEMO-DEMO-GET-CONNECTION ENTRY PROCEDURE DEMO-DEMO-RELEASE-CONNECTION ENTRY PROCEDURE DEMO-DEMO-COMPARE-EQUAL CALL JNI-DESTROY-JAVA-VM USING GIVING RESULT. Create ALGOL library DEMO/LIBRARY COMPILE UD/"DEMO.ALG_M AS DEMO/LIBRARY SL DEMO = (JAVA)OBJECT/DEMO/LIBRARY 2013 Unisys Corporation. All rights reserved. 15
16 Jii Development Process Demo LOCAL-STORAGE SECTION. $$INCLUDE JNICOB="COBOL" ("JNI-PARAMETERS") $$INCLUDE DEMOCOB="""DEMOINCL.C85_M""" ("DEMO-PARAMETERS") PROGRAM-LIBRARY SECTION. $$INCLUDE JNICOB="COBOL" ("JNI-FUNCTIONS") $$INCLUDE DEMOCOB="""DEMOINCL.C85_M""" ("DEMO-FUNCTIONS") PROCEDURE DIVISION Unisys Corporation. All rights reserved. 16
17 Jii Development Process Demo Initialize-JVM. STRING jvmoptions, jvmcp1, jvmcp2, jvmcp3, jvmcp4 DELIMITED BY SIZE INTO ARGUMENTS. ADD FUNCTION Length ( jvmoptions ), FUNCTION Length ( jvmcp1 ), FUNCTION Length ( jvmcp2 ), FUNCTION Length ( jvmcp3 ), FUNCTION Length ( jvmcp4 ) GIVING ArgLength. MOVE MCP-Options TO Arguments-2. MOVE FUNCTION Length ( MCP-Options ) to Arg2Length. CALL JNI-CREATE-JAVA-VM USING JNI-VM, JNI-ENV, Interface-Version, ARGUMENTS, ArgLength ARGUMENTS-2, Arg2Length GIVING RESULT. CALL INITIALIZE-DEMO USING JNI-ENV. CALL DEMO-DEMO-GET-CONNECTION USING JNI-ENV, bresult Unisys Corporation. All rights reserved. 17
18 Jii Development Process Demo OPEN INQUIRY UNIVERSEDB ON EXCEPTION GO TO XIT. loop-it. FIND WORD VIA NEXT IDX-WORDS ON EXCEPTION GO TO XIT. MOVE DMSII-WORD-A TO DataWord. MOVE WORD-SZ TO WordSz. CALL DEMO-DEMO-COMPARE-EQUAL USING JNI-ENV, WORD-ID, DataWord, WordSz, bresult. IF NOT bresult THEN DISPLAY "COMPARE STRING ERROR=", bresult. GO loop-it. xit. CLOSE UNIVERSEDB ON EXCEPTION NEXT SENTENCE Unisys Corporation. All rights reserved. 18
19 Jii Possibilities? Calling Bouncy Castle Crypto API Accessing JBoss through its Java Naming and Directory Interface (JNDI) Accessing third-party databases Creating thumbnails of images PDF Generation Creating JSON data files Using off-the-shelf components written in Java Unisys Corporation. All rights reserved. 19
20 Guidelines for Calling Java Calling Java from native code is complicated and tedious. Crossing between MCP and the Java environment is expensive. Try to write heavy functions. Pass everything as parameters rather than calling back for more information. Stay in Java if you can; calling native code is seldom faster Unisys Corporation. All rights reserved. 20
21 Java Docs Main Page Virtual Machine for the Java 6.0 Platform on ClearPath MCP Programming Guide Installation and Administration Guide ClearPath Common Appliance Configuration Guide JVM for MCP API Specification Java Native Interface for MCP Readme, Errata and Other Notes Optimizing Java Socket Performance Example Java Programs 2013 Unisys Corporation. All rights reserved. 21
22 A Cocktail of Java and MCP Using Java NIO2 Interfaces
23 Java 7 Java SE 7 Available with MCPJAVA in 15.0 New I/O features: Asynchronous I/O Ability to extend and customize the I/O interface. For MCP this means: Ability to query and specify many file attributes Unisys Corporation. All rights reserved. 23
24 Java 7 Example import java.nio.file.*; import com.unisys.mcp.file.*; import static com.unisys.mcp.file.initialfileattributes.*; Path file = FileSystems.getDefault().getPath( args[0] ); file.createfile( FileKind.COBOL85SYMBOL.asFileAttribute(), FileClass.RECORDORIENTED.asFileAttribute(), maximumrecordsize(80), note("this file was created by Java") ); 2013 Unisys Corporation. All rights reserved. 24
25 Java 7 Example file.copyto( destination, StandardCopyOption.ReplaceExisting, McpCopyOption.Recursive, McpCopyOption.SourceHost( ECCSK ), Copies a file identified by the file path at ECCSK to the local host as the file identified by the destination path. Uses MCP copy operation (BNA, FTP). Similar moveto will change the file name, if possible; otherwise copy and delete the original Unisys Corporation. All rights reserved. 25
26 McpFileAttributes Class Provides most MCP attributes for a file. All the various time stamps. Title Note and many more 2013 Unisys Corporation. All rights reserved. 26
27 File Attributes arealength accesstimestamp fileclass areas altertimestamp filekind blocksize attributemodifytimestamp filename clearareas backuptimestamp filestructure compilerkind copydestinationtimestamp framesize ccsversion copysourcetimestamp hostname extmode creationtimestamp licensekey familyindex executetimestamp note familyname opentimestamp pathname sensitivedata readtimestamp product userinfo maximumrecordsize title 2013 Unisys Corporation. All rights reserved. 27
28 Open Options Specify any of these when opening a file. File Options Buffers BufferSize HostName IntName Record Options Fold IncludeSequenceNumbers NoCrLf StripSpaces Truncate Unfold 2013 Unisys Corporation. All rights reserved. 28
29 Initial File Attributes Specify any of these when creating a file. arealength blocksize familyindex hostname note userinfo areas clearareas framesize maximumrecordsize sensitivedata 2013 Unisys Corporation. All rights reserved. 29
30 Java Docs Main Page Virtual Machine for the Java 6.0 Platform on ClearPath MCP Programming Guide Installation and Administration Guide ClearPath Common Appliance Configuration Guide JVM for MCP API Specification Java Native Interface for MCP Readme, Errata and Other Notes Optimizing Java Socket Performance Example Java Programs 2013 Unisys Corporation. All rights reserved. 30
31 A Cocktail of Java and MCP Accessing DMSII From Java
32 Accessing DMSII From Java DMSII Databases D M S Q L 2013 Unisys Corporation. All rights reserved. 32
33 Accessing DMSII From Java COBOL & ALGOL access via Host Language constructs OPEN, FIND/LOCK, CREATE, STORE, BEGIN-TRANSACTION, END-TRANSACTION, Java access Java Host Language Interface (JHLI) and Java DMInterface (JDMI) Java EE Connector Architecture (JCA) components Resource Adapters MCP Transaction Resource Adapter (JRAC) Open Distributed Transaction Processing Resource Adapter (DTP-RA) Java Database Connectivity (JDBC) Resource adapters based on JCA Structured Query Language (SQL) based Hibernate 2013 Unisys Corporation. All rights reserved. 33
34 Querying DMSII using JDBC SQL Client Tools DMSII 2013 Unisys Corporation. All rights reserved. 34
35 JDBC Driver GSA ClearPath JProcessor MCP Presentation Tier/ Business Tier JSF/RichFaces POJO SQL Query Processor for ClearPath MCP DMSII 2013 Unisys Corporation. All rights reserved. 35
36 Summary Invocation interface lets ALGOL or COBOL program call Java libraries. Java 7 will allow tighter file system integration. Consider the alternatives for accessing a DMSII database from Java 2013 Unisys Corporation. All rights reserved. 36
37 Questions? 2013 Unisys Corporation. All rights reserved. 37
Database Access from a Programming Language: Database Access from a Programming Language
Database Access from a Programming Language: Java s JDBC Werner Nutt Introduction to Databases Free University of Bozen-Bolzano 2 Database Access from a Programming Language Two Approaches 1. Embedding
Database Access from a Programming Language:
Database Access from a Programming Language: Java s JDBC Werner Nutt Introduction to Databases Free University of Bozen-Bolzano 2 Database Access from a Programming Language Two Approaches 1. Embedding
The JAVA Way: JDBC and SQLJ
The JAVA Way: JDBC and SQLJ David Toman School of Computer Science University of Waterloo Introduction to Databases CS348 David Toman (University of Waterloo) JDBC/SQLJ 1 / 21 The JAVA way to Access RDBMS
COSC344 Database Theory and Applications. Java and SQL. Lecture 12
COSC344 Database Theory and Applications Lecture 12: Java and SQL COSC344 Lecture 12 1 Last Lecture Trigger Overview This Lecture Java & SQL Source: Lecture notes, Textbook: Chapter 12 JDBC documentation
Cross Platform Software Release Capabilities
Cross Platform Software Release Capabilities Larry Aube ClearPath Portfolio Management ClearPath Briefings 2015 Grove/UK Agenda Data Exchange ClearPath Integration Services ClearPath IDEs 2015 Unisys Corporation.
JDBC. It is connected by the Native Module of dependent form of h/w like.dll or.so. ex) OCI driver for local connection to Oracle
JDBC 4 types of JDBC drivers Type 1 : JDBC-ODBC bridge It is used for local connection. ex) 32bit ODBC in windows Type 2 : Native API connection driver It is connected by the Native Module of dependent
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ. ODBC Architecture. More on ODBC. JDBC vs ODBC. What is JDBC?
What is ODBC? Database Connectivity ODBC, JDBC and SQLJ CS2312 ODBC is (Open Database Connectivity): A standard or open application programming interface (API) for accessing a database. SQL Access Group,
Chapter 9 Java and SQL. Wang Yang [email protected]
Chapter 9 Java and SQL Wang Yang [email protected] Outline Concern Data - File & IO vs. Database &SQL Database & SQL How Connect Java to SQL - Java Model for Database Java Database Connectivity (JDBC)
Java and Databases. COMP514 Distributed Information Systems. Java Database Connectivity. Standards and utilities. Java and Databases
Java and Databases COMP514 Distributed Information Systems Java Database Connectivity One of the problems in writing Java, C, C++,, applications is that the programming languages cannot provide persistence
Database Programming. Week 10-2. *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford
Database Programming Week 10-2 *Some of the slides in this lecture are created by Prof. Ian Horrocks from University of Oxford SQL in Real Programs We have seen only how SQL is used at the generic query
Brazil + JDBC Juin 2001, [email protected] http://jfod.cnam.fr/tp_cdi/douin/
Brazil + JDBC Juin 2001, [email protected] http://jfod.cnam.fr/tp_cdi/douin/ version du 26 Mai 2003 : JDBC-SQL et Brazil pré-requis : lecture de Tutorial JDBC de Sun Bibliographie Brazil [Bra00]www.sun.com/research/brazil
Applets, RMI, JDBC Exam Review
Applets, RMI, JDBC Exam Review Sara Sprenkle Announcements Quiz today Project 2 due tomorrow Exam on Thursday Web programming CPM and servlets vs JSPs Sara Sprenkle - CISC370 2 1 Division of Labor Java
Why Is This Important? Database Application Development. SQL in Application Code. Overview. SQL in Application Code (Contd.
Why Is This Important? Database Application Development Chapter 6 So far, accessed DBMS directly through client tools Great for interactive use How can we access the DBMS from a program? Need an interface
Java DB Performance. Olav Sandstå Sun Microsystems, Trondheim, Norway Submission ID: 860
Java DB Performance Olav Sandstå Sun Microsystems, Trondheim, Norway Submission ID: 860 AGENDA > Java DB introduction > Configuring Java DB for performance > Programming tips > Understanding Java DB performance
OS3036 Put Your ClearPath In Your Pocket
OS3036 Put Your ClearPath In Your Pocket Pramod Nair Senior Solutions Architect ClearPath Application Modernization Center Of Excellence (CAMCOE) May 16, 2012 Agenda Enterprise Mobility Trends Mobile App
SQL and programming languages
SQL and programming languages SET08104 Database Systems Copyright Napier University Slide 1/14 Pure SQL Pure SQL: Queries typed at an SQL prompt. SQL is a non-procedural language. SQL specifies WHAT, not
Remote Method Invocation in JAVA
Remote Method Invocation in JAVA Philippe Laroque [email protected] $Id: rmi.lyx,v 1.2 2003/10/23 07:10:46 root Exp $ Abstract This small document describes the mechanisms involved
JDBC (Java / SQL Programming) CS 377: Database Systems
JDBC (Java / SQL Programming) CS 377: Database Systems JDBC Acronym for Java Database Connection Provides capability to access a database server through a set of library functions Set of library functions
CS 377 Database Systems SQL Programming. Li Xiong Department of Mathematics and Computer Science Emory University
CS 377 Database Systems SQL Programming Li Xiong Department of Mathematics and Computer Science Emory University 1 A SQL Query Joke A SQL query walks into a bar and sees two tables. He walks up to them
FileMaker 8. Installing FileMaker 8 ODBC and JDBC Client Drivers
FileMaker 8 Installing FileMaker 8 ODBC and JDBC Client Drivers 2004-2005 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Distributed Network Management Using SNMP, Java, WWW and CORBA
Distributed Network Management Using SNMP, Java, WWW and CORBA André Marcheto Augusto Hack Augusto Pacheco Augusto Verzbickas ADMINISTRATION AND MANAGEMENT OF COMPUTER NETWORKS - INE5619 Federal University
Java MySQL Connector & Connection Pool
Java MySQL Connector & Connection Pool Features & Optimization Kenny Gryp November 4, 2014 @gryp 2 Please excuse me for not being a Java developer DISCLAIMER What I Don t Like
ClearPath MCP Developer Studio
ClearPath MCP Developer Studio ClearPath MCP Releases 16.0 and 17.0 ClearPath Software Series The ClearPath Software Series is a new innovative collection of software-only solutions without a traditional
LSINF1124 Projet de programmation
LSINF1124 Projet de programmation Database Programming with Java TM Sébastien Combéfis University of Louvain (UCLouvain) Louvain School of Engineering (EPL) March 1, 2011 Introduction A database is a collection
Course Objectives. Database Applications. External applications. Course Objectives Interfacing. Mixing two worlds. Two approaches
Course Objectives Database Applications Design Construction SQL/PSM Embedded SQL JDBC Applications Usage Course Objectives Interfacing When the course is through, you should Know how to connect to and
Using Netbeans and the Derby Database for Projects Contents
Using Netbeans and the Derby Database for Projects Contents 1. Prerequisites 2. Creating a Derby Database in Netbeans a. Accessing services b. Creating a database c. Making a connection d. Creating tables
Security Code Review- Identifying Web Vulnerabilities
Security Code Review- Identifying Web Vulnerabilities Kiran Maraju, CISSP, CEH, ITIL, SCJP Email: [email protected] 1 1.1.1 Abstract Security Code Review- Identifying Web Vulnerabilities This paper
Java and Microsoft Access SQL Tutorial
Java and Microsoft Access SQL Tutorial Introduction: Last Update : 30 April 2008 Revision : 1.03 This is a short tutorial on how to use Java and Microsoft Access to store and retrieve data in an SQL database.
CS/CE 2336 Computer Science II
CS/CE 2336 Computer Science II UT D Session 23 Database Programming with Java Adapted from D. Liang s Introduction to Java Programming, 8 th Ed. and other sources 2 Database Recap Application Users Application
Supplement IV.C: Tutorial for Oracle. For Introduction to Java Programming By Y. Daniel Liang
Supplement IV.C: Tutorial for Oracle For Introduction to Java Programming By Y. Daniel Liang This supplement covers the following topics: Connecting and Using Oracle Creating User Accounts Accessing Oracle
CS2506 Operating Systems II Lab 8, 8 th Tue/03 /2011 Java API
Introduction The JDBC API was designed to keep simple things simple. This means that the JDBC makes everyday database tasks easy. In this lab you will learn about how Java interacts with databases. JDBC
Microsoft SQL Server Features that can be used with the IBM i
that can be used with the IBM i Gateway/400 User Group February 9, 2012 Craig Pelkie [email protected] Copyright 2012, Craig Pelkie ALL RIGHTS RESERVED What is Microsoft SQL Server? Windows database management
Custom Encryption in Siebel & Siebel Web Service Security Test Guide 1.0
Custom Encryption in Siebel & Siebel Web Security Test Guide 1.0 Muralidhar Reddy Introduction Siebel (7.5 onwards and upto 8.1) natively supports 2 Types of Inbound web Security 1. WS Security UserName
Java Server Pages and Java Beans
Java Server Pages and Java Beans Java server pages (JSP) and Java beans work together to create a web application. Java server pages are html pages that also contain regular Java code, which is included
CS346: Database Programming. http://warwick.ac.uk/cs346
CS346: Database Programming http://warwick.ac.uk/cs346 1 Database programming Issue: inclusionofdatabasestatementsinaprogram combination host language (general-purpose programming language, e.g. Java)
Put a Firewall in Your JVM Securing Java Applications!
Put a Firewall in Your JVM Securing Java Applications! Prateep Bandharangshi" Waratek Director of Client Security Solutions" @prateep" Hussein Badakhchani" Deutsche Bank Ag London Vice President" @husseinb"
SQL and Java. Database Systems Lecture 19 Natasha Alechina
Database Systems Lecture 19 Natasha Alechina In this Lecture SQL in Java SQL from within other Languages SQL, Java, and JDBC For More Information Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc
Security Module: SQL Injection
Security Module: SQL Injection Description SQL injection is a security issue that involves inserting malicious code into requests made to a database. The security vulnerability occurs when user provided
Java Programming. JDBC Spring Framework Web Services
Chair of Software Engineering Java Programming Languages in Depth Series JDBC Spring Framework Web Services Marco Piccioni May 31st 2007 What will we be talking about Java Data Base Connectivity The Spring
CSc 230 Software System Engineering FINAL REPORT. Project Management System. Prof.: Doan Nguyen. Submitted By: Parita Shah Ajinkya Ladkhedkar
CSc 230 Software System Engineering FINAL REPORT Project Management System Prof.: Doan Nguyen Submitted By: Parita Shah Ajinkya Ladkhedkar Spring 2015 1 Table of Content Title Page No 1. Customer Statement
Transparent Redirection of Network Sockets 1
Transparent Redirection of Network Sockets 1 Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,nsuri}@ai.uwf.edu
How To Use The Database In Jdbc.Com On A Microsoft Gdbdns.Com (Amd64) On A Pcode (Amd32) On An Ubuntu 8.2.2 (Amd66) On Microsoft
CS 7700 Transaction Design for Microsoft Access Database with JDBC Purpose The purpose of this tutorial is to introduce the process of developing transactions for a Microsoft Access Database with Java
FileMaker 11. ODBC and JDBC Guide
FileMaker 11 ODBC and JDBC Guide 2004 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Self-test Database application programming with JDBC
Self-test Database application programming with JDBC Document: e1216test.fm 18/04/2012 ABIS Training & Consulting P.O. Box 220 B-3000 Leuven Belgium TRAINING & CONSULTING INTRODUCTION TO THE SELF-TEST
Network/Socket Programming in Java. Rajkumar Buyya
Network/Socket Programming in Java Rajkumar Buyya Elements of C-S Computing a client, a server, and network Client Request Result Network Server Client machine Server machine java.net Used to manage: URL
Division of Informatics, University of Edinburgh
CS1Bh Lecture Note 20 Client/server computing A modern computing environment consists of not just one computer, but several. When designing such an arrangement of computers it might at first seem that
How To Use A Sas Server On A Java Computer Or A Java.Net Computer (Sas) On A Microsoft Microsoft Server (Sasa) On An Ipo (Sauge) Or A Microsas (Sask
Exploiting SAS Software Using Java Technology Barbara Walters, SAS Institute Inc., Cary, NC Abstract This paper describes how to use Java technology with SAS software. SAS Institute currently offers several
TECH TUTORIAL: EMBEDDING ANALYTICS INTO A DATABASE USING SOURCEPRO AND JMSL
TECH TUTORIAL: EMBEDDING ANALYTICS INTO A DATABASE USING SOURCEPRO AND JMSL This white paper describes how to implement embedded analytics within a database using SourcePro and the JMSL Numerical Library,
FTP Client Engine Library for Visual dbase. Programmer's Manual
FTP Client Engine Library for Visual dbase Programmer's Manual (FCE4DB) Version 3.3 May 6, 2014 This software is provided as-is. There are no warranties, expressed or implied. MarshallSoft Computing, Inc.
Comparing the Effectiveness of Penetration Testing and Static Code Analysis
Comparing the Effectiveness of Penetration Testing and Static Code Analysis Detection of SQL Injection Vulnerabilities in Web Services PRDC 2009 Nuno Antunes, [email protected], [email protected] University
Performance Tuning for the JDBC TM API
Performance Tuning for the JDBC TM API What Works, What Doesn't, and Why. Mark Chamness Sr. Java Engineer Cacheware Beginning Overall Presentation Goal Illustrate techniques for optimizing JDBC API-based
Introduction... 2. Web Portal... 2. Main Page... 4. Group Management... 4. Create group... 5. Modify Group Member List... 5
SSDB Table of Contents Introduction... 2 Web Portal... 2 Main Page... 4 Group Management... 4 Create group... 5 Modify Group Member List... 5 Modify the Authority of Group Members to Tables... 9 Expand
Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.
Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company
Java SE 7 Programming
Oracle University Contact Us: 1.800.529.0165 Java SE 7 Programming Duration: 5 Days What you will learn This Java SE 7 Programming training explores the core Application Programming Interfaces (API) you'll
Abstract. Introduction. Web Technology and Thin Clients. What s New in Java Version 1.1
Overview of Java Components and Applets in SAS/IntrNet Software Barbara Walters, SAS Institute Inc., Cary, NC Don Chapman, SAS Institute Inc., Cary, NC Abstract This paper describes the Java components
Java SE 7 Programming
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Java SE 7 Programming Duration: 5 Days What you will learn This Java Programming training covers the core Application Programming
Elements of Advanced Java Programming
Appendix A Elements of Advanced Java Programming Objectives At the end of this appendix, you should be able to: Understand two-tier and three-tier architectures for distributed computing Understand the
Services. Relational. Databases & JDBC. Today. Relational. Databases SQL JDBC. Next Time. Services. Relational. Databases & JDBC. Today.
& & 1 & 2 Lecture #7 2008 3 Terminology Structure & & Database server software referred to as Database Management Systems (DBMS) Database schemas describe database structure Data ordered in tables, rows
Supplement IV.D: Tutorial for MS Access. For Introduction to Java Programming By Y. Daniel Liang
Supplement IV.D: Tutorial for MS Access For Introduction to Java Programming By Y. Daniel Liang This supplement covers the following topics: Creating Databases and Executing SQL Creating ODBC Data Source
NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide
NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide NGASI SaaS Hosting Automation is a JAVA SaaS Enablement infrastructure that enables web hosting services
Working With Derby. Version 10.2 Derby Document build: December 11, 2006, 7:06:09 AM (PST)
Working With Derby Version 10.2 Derby Document build: December 11, 2006, 7:06:09 AM (PST) Contents Copyright...3 Introduction and prerequisites...4 Activity overview... 5 Activity 1: Run SQL using the
Version 14.0. Overview. Business value
PRODUCT SHEET CA Datacom Server CA Datacom Server Version 14.0 CA Datacom Server provides web applications and other distributed applications with open access to CA Datacom /DB Version 14.0 data by providing
Jaybird 2.1 JDBC driver. Java Programmer's Manual
Jaybird 2.1 JDBC driver Java Programmer's Manual The contents of this Documentation are subject to the Public Documentation License Version 1.0 (the License ); you may only use this Documentation if you
CHAPTER 3. Relational Database Management System: Oracle. 3.1 COMPANY Database
45 CHAPTER 3 Relational Database Management System: Oracle This chapter introduces the student to the basic utilities used to interact with Oracle DBMS. The chapter also introduces the student to programming
FileMaker 14. ODBC and JDBC Guide
FileMaker 14 ODBC and JDBC Guide 2004 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks of FileMaker,
An Introduction to Application Security in J2EE Environments
An Introduction to Application Security in J2EE Environments Dan Cornell Denim Group, Ltd. www.denimgroup.com Overview Background What is Application Security and Why is It Important? Specific Reference
Transparent Redirection of Network Sockets 1
Transparent Redirection of Network Sockets Timothy S. Mitrovich, Kenneth M. Ford, and Niranjan Suri Institute for Human & Machine Cognition University of West Florida {tmitrovi,kford,[email protected].
Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur
Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker
WEB DATABASE PUBLISHING
WEB DATABASE PUBLISHING 1. Basic concepts of WEB database publishing (WEBDBP) 2. WEBDBP structures 3. CGI concepts 4. Cold Fusion 5. API - concepts 6. Structure of Oracle Application Server 7. Listeners
Figure 1. Accessing via External Tables with in-database MapReduce
1 The simplest way to access external files or external data on a file system from within an Oracle database is through an external table. See here for an introduction to External tables. External tables
Java SE 7 Programming
Java SE 7 Programming The second of two courses that cover the Java Standard Edition 7 (Java SE 7) Platform, this course covers the core Application Programming Interfaces (API) you will use to design
Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 1 (2013), pp. 53-69 Running and Testing Java EE Applications in Embedded Mode with JupEEter Framework Marcin Kwapisz 1 1 Technical University of Lodz Faculty
Introduction to HP ArcSight ESM Web Services APIs
Introduction to HP ArcSight ESM Web Services APIs Shivdev Kalambi Software Development Manager (Correlation Team) #HPProtect Agenda Overview Some applications of APIs ESM Web Services APIs Login Service
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
DELIVER Utility for MCP Systems
MGS, Inc. Computer Business Solutions DELIVER Utility for MCP Systems Reference Manual Version 1.09 September, 2012 Rev 1 DELIVER Utility for MCP Systems Reference Manual Version 1.09 Copyright 2009-2012
Enterprise Java. Where, How, When (and When Not) to Apply Java in Client/Server Business Environments. Jeffrey Savit Sean Wilcox Bhuvana Jayaraman
Enterprise Java Where, How, When (and When Not) to Apply Java in Client/Server Business Environments Jeffrey Savit Sean Wilcox Bhuvana Jayaraman McGraw-Hill j New York San Francisco Washington, D.C. Auckland
1 SQL Data Types and Schemas
COMP 378 Database Systems Notes for Chapters 4 and 5 of Database System Concepts Advanced SQL 1 SQL Data Types and Schemas 1.1 Additional Data Types 1.1.1 User Defined Types Idea: in some situations, data
To Java SE 8, and Beyond (Plan B)
11-12-13 To Java SE 8, and Beyond (Plan B) Francisco Morero Peyrona EMEA Java Community Leader 8 9...2012 2020? Priorities for the Java Platforms Grow Developer Base Grow Adoption
Evaluation. Copy. Evaluation Copy. Chapter 7: Using JDBC with Spring. 1) A Simpler Approach... 7-2. 2) The JdbcTemplate. Class...
Chapter 7: Using JDBC with Spring 1) A Simpler Approach... 7-2 2) The JdbcTemplate Class... 7-3 3) Exception Translation... 7-7 4) Updating with the JdbcTemplate... 7-9 5) Queries Using the JdbcTemplate...
Fachbereich Informatik und Elektrotechnik SunSPOT. Ubiquitous Computing. Ubiquitous Computing, Helmut Dispert
Ubiquitous Computing Ubiquitous Computing The Sensor Network System Sun SPOT: The Sun Small Programmable Object Technology Technology-Based Wireless Sensor Networks a Java Platform for Developing Applications
unisys ClearPath Enterprise Servers SQL Query Processor for ClearPath MCP Installation and Operations Guide ClearPath MCP 16.0
unisys ClearPath Enterprise Servers SQL Query Processor for ClearPath MCP Installation and Operations Guide ClearPath MCP 16.0 April 2014 3850 8206 005 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS
www.virtualians.pk CS506 Web Design and Development Solved Online Quiz No. 01 www.virtualians.pk
CS506 Web Design and Development Solved Online Quiz No. 01 Which of the following is a general purpose container? JFrame Dialog JPanel JApplet Which of the following package needs to be import while handling
Java SE 8 Programming
Oracle University Contact Us: 1.800.529.0165 Java SE 8 Programming Duration: 5 Days What you will learn This Java SE 8 Programming training covers the core language features and Application Programming
LAE 5.1. Windows Server Installation Guide. Version 1.0
LAE 5.1 Windows Server Installation Guide Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS THEREOF MAY NOT BE REPRODUCED IN ANY FORM WITHOUT
Replication on Virtual Machines
Replication on Virtual Machines Siggi Cherem CS 717 November 23rd, 2004 Outline 1 Introduction The Java Virtual Machine 2 Napper, Alvisi, Vin - DSN 2003 Introduction JVM as state machine Addressing non-determinism
EJB 3.0 and IIOP.NET. Table of contents. Stefan Jäger / [email protected] 2007-10-10
Stefan Jäger / [email protected] EJB 3.0 and IIOP.NET 2007-10-10 Table of contents 1. Introduction... 2 2. Building the EJB Sessionbean... 3 3. External Standard Java Client... 4 4. Java Client with
Crash Course in Java
Crash Course in Java Based on notes from D. Hollinger Based in part on notes from J.J. Johns also: Java in a Nutshell Java Network Programming and Distributed Computing Netprog 2002 Java Intro 1 What is
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Web Application Security. Vulnerabilities, Weakness and Countermeasures. Massimo Cotelli CISSP. Secure
Vulnerabilities, Weakness and Countermeasures Massimo Cotelli CISSP Secure : Goal of This Talk Security awareness purpose Know the Web Application vulnerabilities Understand the impacts and consequences
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
Operating Systems and Networks
recap Operating Systems and Networks How OS manages multiple tasks Virtual memory Brief Linux demo Lecture 04: Introduction to OS-part 3 Behzad Bordbar 47 48 Contents Dual mode API to wrap system calls
S y s t e m A r c h i t e c t u r e
S y s t e m A r c h i t e c t u r e V e r s i o n 5. 0 Page 1 Enterprise etime automates and streamlines the management, collection, and distribution of employee hours, and eliminates the use of manual
Middleware Lou Somers
Middleware Lou Somers April 18, 2002 1 Contents Overview Definition, goals, requirements Four categories of middleware Transactional, message oriented, procedural, object Middleware examples XML-RPC, SOAP,
First Java Programs. V. Paúl Pauca. CSC 111D Fall, 2015. Department of Computer Science Wake Forest University. Introduction to Computer Science
First Java Programs V. Paúl Pauca Department of Computer Science Wake Forest University CSC 111D Fall, 2015 Hello World revisited / 8/23/15 The f i r s t o b l i g a t o r y Java program @author Paul Pauca
Software Architecture Document
Software Architecture Document File Repository Cell 1.3 Partners/i2b2.org 1 of 23 Abstract: This is a software architecture document for File Repository (FRC) cell. It identifies and explains important
CA Workload Automation Agent for Databases
CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
