Well I’ve said once or twice that I’ve finally taken up learning Python… so far I’m really impressed with the language, although I’m not overly familiar with it yet. Since …
OS X Tiger: A Developer’s Paradise
Justin Williams over at Mac Zealots posted an article back in April about the various development technologies that ship in OS X Tiger, called Mac OS X Tiger: For Developers. …
Try/Catch/Finally in Java
So I ran across an article not too long ago, can’t remember where, it was one of those things that just gets passed around, about the importance of try/catch/finally… and …
Double Buffer Issue in JTabbedPane
So I tested my client tools for the first time on a Windows XP platform the other day. The system was a clean install running JDK 1.4.2_03 — and to …
JDBC Metadata and Column Types
Today I’ve been testing my data caching module… it’s pretty straight foward, the relevant part for today’s ramblings is that it takes an SQL query, executes that query on some …
Loading Arbitrary Classes from Arbitrary Places in Java
One of my very favorite things about the JDK is portability… and not just the “compile-once-run-anywhere” portability Java is so famous for, but also the portability across providers. JAAS, JCE, …
JBoss User Timeout
When most people think of the session timeout in an EJB application, they’re typically thinking about the HttpSession timeout of their web front ends. If, however, you need to set …
Securing EJB Applications with JBoss Login Modules
JBoss comes out-of-the-box with a handful of great login modules, but lets face it, you need a custom one to integrate with your existing security infrastructure. This overview shows you …
Custom JAAS Login Modules
This tutorial will show you in detail the steps required to implement a custom JAAS login module for a Java application. When a client application needs to authenticate the user, …
Securing EJB Applications with a Custom JBoss Login Module
JBoss comes out-of-the-box with a handful of great login modules, but lets face it, you need a custom one to integrate with your existing security infrastructure. This overview shows you …