Archive Index (1999-2012) | 2013-current at | About  

15 from IBM: wireless, Eclipse, Java, grids, Linux, …

Nov 26, 2003 — by LinuxDevices Staff — from the LinuxDevices Archive

IBM has published the following fifteen technical articles, tutorials, and downloads on its developerWorks and alphaWorks Websites. They cover a range of interesting (though not necessarily embedded) technical topics. Some require free registration. Enjoy . . .

  • Evolving with the object-oriented wireless model — The history of how storage and retrieval systems have evolved — from flat file databases to object-oriented database management systems — is important for designers of object-oriented wireless systems, especially when development funds are tight. Knowing how various models on the evolutionary path store and retrieve complex data can keep developers from trudging into a dead end, thereby increasing their design productivity relative to costs. This article highlights the evolving storage/retrieval systems and presents a conceptual tour through a hierarchical structure of database objects, illuminating the basics of the wireless model and predicting the coming object-oriented attractions.
  • Equipping SWT applications with content assistants — For users of the Eclipse Java editor, content assistants are a well-known feature. You press Ctrl + spacebar, and a window with a set of completion proposals pops up. Selection of a specific proposal opens another window showing a preview of the insertion of the selected proposal. Committing a proposal with the Enter key or a double-click inserts the proposal into the current document. This article shows how you can easily add this feature to any SWT-based application, either a stand-alone application or a plug-in to the Eclipse workbench.
  • Java security, Part 1: Crypto basics — The Java platform, both its base language features and library extensions, provides an excellent base for writing secure applications. In this tutorial, the first of two parts on Java security, Brad Rubin guides you through the basics of cryptography and how it is implemented in the Java programming language, using plenty of code examples to illustrate the concepts.
  • Java security, Part 2: Authentication and authorization — The Java platform, both its base language features and library extensions, provides an excellent base for writing secure applications. In this tutorial, Part 2 of 2, Brad Rubin introduces the basic concepts of authentication and authorization and provides an architectural overview of JAAS. Through the use of a sample application, he'll guide your understanding of JAAS from theory to practice. By the end of the tutorial you will have a good foundation for working with JAAS on your own.
  • HeapRootsHeapRoots analyses “heap dumps,” which are files (typically text files) containing information about the objects in the JVM garbage collected heap. Some IBM VMs (contained in the IBM Developer Kits for Windows, Java Edition) have the ability to produce heap dumps on demand; heap dumps can also be triggered by out-of-memory situations.
  • Build a wireless solution with JavaServer Pages This article gives an overview of IBM?s mobile strategy and describes the main features and functions of IBM WebSphere Everyplace Access V4.3 and DB2 Everyplace V8.1.2. Then it takes you through a JavaServer Pages (JSP) Enterprise Resource Planning (ERP) sample solution and the development steps to implement the solution.
  • Invoking Web services with Java clients — There are two families of Web services clients in the Java world: unmanaged and J2EE container-managed clients. This article describes Web services invocation, Web services standards for Java environments, the different types of Java Web services clients and explains how to write portable, vendor independent code.
  • Build a grid application with Python, Part 2: Communication — Grid components need to talk to each other. The distributor needs to talk to the grid providers, the providers need to talk back, and clients and management tools need to talk to the distributor and providers. Providers may need to talk to each other, or they may need to look up information from another machine to determine information or status information from the grid. In this tutorial we look at ways to handle communication in a Python grid framework, from the basics of the TCP/IP system to the simplified, externally managed e-mail solution.
  • Next-generation grids focus on app integration — The beauty of the grid is that it can draw on a wide range of heterogeneous hardware devices and operating systems. But what does it take to integrate and manage your applications across all these resources? This article explores the emerging tools and technologies that are making it work.
  • Design an application for gridDesigning an application for grid computing is much easier if you know what to expect. In this article, you will learn which design elements are suitable for a grid application and which are not. Armed with this information, you can then tailor existing applications and develop new ones for a grid by focusing on the jobs, the data, and the environment that the application will use. You should also plan to use a development environment or toolkit specifically designed for grid applications, such as the Globus Toolkit.
  • Remote scripting servlet in action — This article presents a Web-based incoming-call monitor for a Customer Service Representative (CSR) in a Customer Relationship Management, or CRM, product based on Erik Hatcher's work, “Remote scripting using a servlet.” To take that a step further, Victor Yang here analyzes those requirements and looks into such design options as why IFRAME is recommended over XML-RPC. Finally, he'll show you how to customize the original framework while explaining the key issues that take place during implementation with the code snippets
  • A high-performance, massively scalable P2P network — JXTA 2 is the second major release of the open source P2P network building substrate with a popular Java-based reference implementation. Significant design modifications have been introduced to create higher performance, massively scalable, and maintainable P2P networks. This article, which builds on Sing Li's JXTA series Making P2P interoperable, published two years ago, brings you up to date on the platform's major changes.
  • Securing your Web serverThis tutorial details how to “lock down” a Web server in less than an hour. It covers physical security, the importance of firewalls, correct application installation, file permissions, application configuration, and techniques that allow Web page maintainers to do their job without sacrificing system integrity.
  • How to build your next app on LinuxHungry for Linux apps? Get the overview, training, and tech support you will need. We're serving up IBM middleware for Linux (DB2 Universal Database, WebSphere Application Server, WebSphere Studio Site Developer, WebSphere MQ, Lotus Domino, Tivoli Access Manager, and more) on a free Linux Software Evaluation Kit (SEK) — plus all the free tech support and training you need to get started!
  • Free Q4 2003 IBM Linux middleware CD Set — This Q4 Software Evaluation Kit release contains all of IBM's middleware ported to Linux, including DB2, WebSphere, Tivoli, and Lotus Notes, as well as developer code examples, tutorials, whitepapers, developer tips and articles on Java, XML, Wireless, Web Services, Security, Grid Computing, and Linux. A fast registration is all that is needed for it to be mailed to you at no charge.

This article was originally published on and has been donated to the open source community by QuinStreet Inc. Please visit for up-to-date news and articles about Linux and open source.

Comments are closed.