ven though Web 2.0 and rich Internet applications (RIAs) are all the rage these days, building a rich Web front end for your stakeholders is not the answer when thick-client functionality is what you really need. I stated as much in my previous article, "Building a Java App Server Foundation for Thick-Client Deployment," which showed how to leverage a traditional Java Web server architecture to easily deploy thick clients.
Exception Handling with Spring and Log4J
How to log exceptions. This technique will log messages to your server log file, send an email, with the tag stack of the error, for error level warnings and display a generic page to the user.
First step is to set up Log4j.
Make sure you have the following classes in application lib or common server lib.
activation.jar
This can be got from http://java.sun.com/products/javabeans/jaf/downloads/index.html
Set up your log4J configuration file, put this file in your WEB-INF directory
This document is a guide to help troubleshoot problems that might arise with applications that are developed using the Sun Microsystems Inc. release of Java Platform, Standard Edition 6 (JDK 6 release or Java SE 6 release). In particular, this guide addresses possible problems between the applications and the Java HotSpot virtual machine. The document provides a description of the tools, command line options, and other help in analyzing a problem. The document also provides guidance on how to approach some general issues such as a crash, hang, or memory resource issues. Finally, the document provides direction for data collection and bug report preparation.
No Thick Manuals is a wiki that offers a growing collection of quality hands-on articles and tips to the best open source applications for Linux, Windows, and Mac OS X. No Thick Manuals was born on February 6, 2005. All No Thick Manuals articles and tips are released under the GNU Free Documentation License. No Thick Manuals supports open source software (see a list of projects that have received donations).
sux0r 2.0 is an extendable content management system (CMS) built around the principles of Naive Bayesian probabilistic content.
Naive Bayesian Categorization is the ouija board of mathematics. Known for being good at filtering junk mail, the Naive Bayesian algorithm can categorize anything so long as there are coherent reference texts to work from. For example, categorizing documents in relation to a vector of political manifestos, or religious holy books, make for a neat trick. More subjective magic 8-ball categories could be "good vs. bad" or company press releases in relation to stock market prices.
In addition to being a blog, RSS aggregator, bookmark repository, and photo publishing platform, sux0r 2.0 allows users to maintain multiple lists of Naive Bayesian categories. These category lists, called vectors, can be shared with other users. This allows a group of trusted friends to share, train, and use sux0r together.
This book is an introduction to Java™ language--a widely used programming language and a platform. It is meant to be both an introductory guide and a useful reference on Java and related technologies.
ChunkIt! is a safe and innovative add-on to your Internet browser that searches and extracts the valuable "chunks" of information often hidden within the countless hyperlinks that comprise the Web.
What do we mean by a "chunk"? Think of a chunk as a compact block of content, text, or data that contains enough descriptive information pertaining to your search terms to convey an idea.
After a quick install, you'll see the new ChunkIt! search box appear in your browser. By entering keywords in the ChunkIt! search box, valuable information from the Web will become much easier to find. This revolutionary approach to search will save you hours of time and frustration because you can avoid aimless browsing and endless clicking from one link to another. It's the perfect application for researching consumer products, gathering important information, sifting through discussion groups and blogs, and finding answers to all your home and technical problems.
Using a rule engine provides a framework that allows a way to externalize business logic in a common place. This will in turn empower business users and subject matter experts of the business to easily change and manage the rules. Coding such rules directly into the application makes application maintenance difficult and expensive because the rules change so often. This article goes into detail on how to architect and build a service that uses Drools to provide business decisions. This service can be part of the overall enterprise SOA infrastructure. As such, it can either be a standalone service that is consumed in a one-to-many model by all contracted consumers, or part of a composite service that provides a complex business functionality. To illustrate this point, the article shows how a service using the Drools rule engine can hide the complexity of automating mortgage underwriting decisions that a mortgage company needs to make on a daily basis.
Spring Remoting with Security and SSL
September 30th, 2008 by Mattias Hellborg Arthursson — Security, Spring
Avatar of Mattias Hellborg Arthursson
One of my favorite features of the Spring Framework is the Spring Remoting part, which enables you to expose any bean in a Spring Application Context as a remote service over HTTP. It's fast, it's easy, and it's really, really simple.
In what I hope will be the first of several articles about Guice, a new lightweight dependency injection container from Bob Lee and Kevin Bourillion from Google, this article examines the simplest and most obvious use case for the Guice container, for mocking or faking objects in unit tests. In future articles I will examine other, more ambitious areas where it can be used, including dependency elimination in large code bases.
L. Cameron, S. Wise, and S. Lottridge. College & Research Libraries, 68 (3):
229-236(May 2007)M3: Article; Cameron, Lynn 1 Email Address: camerosl@jmu.edu Wise, Steven L. 2 Email Address: wisesl@jmu.edu Lottridge, Susan M. 3 Email Address: daffinsm@jmu.edu; Affiliations: 1: Coordinator of Library Instruction, James Madison University Libraries, James Madison University 2: Professor of Graduate Psychology and Coordinator, Institute for Computer-Based Assessment, Center for Assessment and Research Studies, James Madison University 3: Doctoral Student, Center for Assessment and Research Studies, James Madison University; Source Information: May2007, Vol. 68 Issue 3, p229; Subject Term: INFORMATION literacy; Subject Term: ABILITY -- Testing; Subject Term: COMPUTERS & literacy; Subject Term: LITERACY; Subject Term: EDUCATION -- Standards; Subject Term: EDUCATIONAL evaluation; Subject Term: Software; Number of Pages: 8p; Illustrations: 2 charts; Document Type: Article.