17 Results for:CMT

  • Sort by: 

How to verify 140-2 (FIPS 140-2) compliance

By Joel Dubin 18 Apr 2007

In this SearchSecurity.com Q&A, identity management and access control expert, Joel Dubin, discuses several ways to verify that Federal Information Processing Standard 140-2 is being enforced. Read More

Java Pseudo Transactions With Non-Transactional Resources

01 Jan 2009

When working in enterprise environments, it is often necessary to interact with multiple resources in a single atomic unit of work – a distributed transaction. The ideal way to accomplish this is by ... Read More

Creating, viewing and installing Oracle Solaris 10 into a domain

07 Mar 2011

Check out the proper commands to create a guest domain, view its devices and install Oracle Solaris 10 into it while monitoring the domain's activity. Read More

Scaling Your Java EE Applications

01 Jul 2008

In this article, Wang Yu takes real world cases as examples to explain ways on how to scale Java applications based on his experiences on the laboratory projects, and at the same time, bring together practice, ... Read More

Introduction to the Spring Framework

01 May 2005

Since the first version of this article was published in October, 2003, the Spring Framework has steadily grown in popularity. It has progressed through version 1.0 final to the present 1.2, and has been adopted in... Read More

Introduction to the Spring Framework 2.5

01 Oct 2007

The Spring Framework has continued to grow in popularity, and has become the de facto standard for enterprise Java development. In this article, I'll try to explain what Spring sets out to achieve, and how I ... Read More

Asynchronous Processes Modeled as Persistent Finite State Machines

06 Aug 2009

The need for a way to execute concurrent tasks within Java has been addressed within JSE by the java.util.concurrent.Executor and in a limited fashion in JEE by the WorkManager specification. Unfortunately, the ... Read More