Friday, September 13, 2002
All that JAAS
JAAS, the Java Authentication and Authorization Service API, provides flexible and scalable mechanisms for securing your client- and server-side Java applications. Where earlier Java security frameworks focused on protecting the user from mobile code, based on the code's origins and who created it, JAAS protects the system from users, based on who runs the code and their permissions. This pluggable, stackable API lets you incorporate standard security mechanisms like Solaris NIS (Network Information Services), Windows NT, LDAP (lightweight access directory protocol), Kerberos, and others into your application in a consistent, configurable way. This article first introduces you to the core elements of JAAS authentication. It then shows you how to develop your own custom login modules, using both command-line- and JSP (JavaServer Page)-based examples that authenticate against user records stored in a JDBC (Java Database Connectivity)-compatible RDBMS (relational database management system).#
Getting Started with JXTA, Part 1
In this chapter, we'll see how to get started with JXTA. Although JXTA is a language- and platform-neutral specification, we'll focus on using the standard JXTA applications for the Java platform. The basic concepts that you'll learn in this chapter are applicable to any JXTA implementation using any language; we chose to illustrate the concepts of JXTA using the Java platform because it allows for the simplest discussion of JXTA concepts, and because the Java platform gives us a common basis for our examples, regardless of the computer on which you might run them.#
Wednesday, September 11, 2002
Tim Bray on Versioning with XML Namespaces
When you have a new namespace, I think you have a new language.
Hmmm. I think he's right. #
Get ready for XForms
nal HTML forms violate many of the tenets of good markup language design, frequently mixing presentation and data. In this article, Joel Rivera and Len Taing introduce you to XForms, an extension of XHTML that represents the next generation of Web forms. Though XForms is still in an embryonic state, it holds great promise: For instance, a form written with XForms can be written once and displayed in optimal ways on several different platforms. This article will give you a head start on this important emerging XML technology.#
Creating Java 2D Composites for Rollover Effects
When creating or using Java applications, you may have experienced some interesting rollover and/or selection effects when using default Swing mechanisms. A more consistent, more common result can be reached using the Java2D API which allows you to methodically define composite values for rollover and selection events. In this article, discover how images are constructed within Java language and how they can be manipulated using AWT composites.#
Marketing Software, Part 1
So you've built what you think is a great application. All your Mac-using friends think it's cool. Your beta testers tell you that it works. All you've got to do now is post it to VersionTracker and Download.com and you can quit your day job, right?#
MVC in Next-Gen Cocoon
With the control flow architecture in place a Cocoon Web application is split in three different conceptual layers, using the well-known Model-View-Controller (MVC) pattern...
But in order to validate there is no script in the user input HTML, I needed a class that let me scan the HTML on a node by node basis. Then I could check to ensure only the limited set of tags I support were used and that no script was attached to any of the tags. What I needed was something like System.Xml.XmlReader, but for HTML. It didn't exist, so I built my own.#
Tuesday, September 10, 2002
10 choices that were critical to the Net's success
At a telecom conference in Massachusetts last week, Bradner, senior technical consultant at Harvard University and a longtime leader in the formation of Internet standards, listed 10 crucial decisions along the way. (You may have other candidates; send them to me and I'll list them on my Web page).#
Monday, September 09, 2002
The Importance of Metadata: Reification, Categorization and UDDI
Look behind the UDDI metadata structure to see how to best employ it within a UDDI registry, both in the UDDI Business Registry (UBR) and in UDDI Services of Microsoft Windows .NET Server; see how to create custom categorization schemes that allow users to solve particular problems in description and discovery.
I started development years ago with Lotus Notes, and I'm either falling back to what I know best, or am rediscovering something which Ozzie knew over a decade ago - a lot of really good info can be stored in a simple data store: Title, body, date, author. Think of your email. How much stuff is in there? And how complicated are the fields? Not very...
Sunday, September 08, 2002
Portal Syndication with Web Services and Cocoon
Latest generation web portals demand more than simply posting cross linked news stories from RSS. Embedding and personalizing rich content and behavior from remote portals is becoming necessity. Limited success has been achieved through complex and sophisticated backend integration via proprietary or Web Services compliant protocols.#