17 Results for:CMT
- Sort by:
How to verify 140-2 (FIPS 140-2) compliance
18 Apr 2007In this SearchSecurity.com Q&A, identity management and access control expert, Joel Dubin, discuses several ways to verify that Federal Information Processing Standard 140-2 is being enforced. Read More
Java Pseudo Transactions With Non-Transactional Resources
01 Jan 2009When working in enterprise environments, it is often necessary to interact with multiple resources in a single atomic unit of work – a distributed transaction. The ideal way to accomplish this is by ... Read More
Creating, viewing and installing Oracle Solaris 10 into a domain
07 Mar 2011Check out the proper commands to create a guest domain, view its devices and install Oracle Solaris 10 into it while monitoring the domain's activity. Read More
Scaling Your Java EE Applications
01 Jul 2008In this article, Wang Yu takes real world cases as examples to explain ways on how to scale Java applications based on his experiences on the laboratory projects, and at the same time, bring together practice, ... Read More
Introduction to the Spring Framework
01 May 2005Since the first version of this article was published in October, 2003, the Spring Framework has steadily grown in popularity. It has progressed through version 1.0 final to the present 1.2, and has been adopted in... Read More
Introduction to the Spring Framework 2.5
01 Oct 2007The Spring Framework has continued to grow in popularity, and has become the de facto standard for enterprise Java development. In this article, I'll try to explain what Spring sets out to achieve, and how I ... Read More
Asynchronous Processes Modeled as Persistent Finite State Machines
06 Aug 2009The need for a way to execute concurrent tasks within Java has been addressed within JSE by the java.util.concurrent.Executor and in a limited fashion in JEE by the WorkManager specification. Unfortunately, the ... Read More