News about Oracle's Solaris and Sun Hardware
System News
May 5th, 2003 — May 11th, 2003 Generate the Custom HTML Email for this Issue
System News System News for Sun Users
Volume 63, Issue 1 << Previous Issue | Next Issue >>
Sections in this issue:
click to jump to section

Java Technology
Create a Simple Socket Application Running in Project JXTA's P2P Network
Tutorial with Code

A tutorial from Daniel Brookshier, author and Java technology architect, illustrates how to use the new JXTA Socket API in Project JXTA 2.0. He covers the reasons why P2P is becoming more popular and provides code for a chat application.

Using Java API for XML-based RPC with the Sun ONE Web Services Platform Developer Edition
Make Web Service Requests Through XML-based Remote Procedure Calls

Ed Ort of the Java Developer Connection presents a two-part article on the Java API for XML-based RPC (JAX-RPC) and how to use it with two components of the Sun ONE Web Services Platform Developer Edition (formerly known as the Sun ONE Developer Platform), specifically Sun ONE Application Server 7 and Sun ONE Studio 4 Update 1 Enterprise Edition. (The Sun ONE Application Server was formerly the iPlanet Application Server and Sun ONE Studio was formerly Forte for Java software.)

Sun's Guy Steele Discusses the Java Programming Language
Focuses on Language Design, Overload Operators, Overall Growth

In a recent interview, Sun Fellow and noted programmer Guy Steele discusses some of the similarities between programming and language design, overload operators and overall growth in the Java programming language. Steele also examines his first encounter with Java technology and some of the perils that might occur if the language continues to grow.

The UltraSPARC Processor Family -- Sized to Fit the Application
A Beginner's Guide to Microprocessor Buying

UltraSPARC processors are designed at multiple design points to address specific application requirements. High-end UltraSPARC processors that support large-way, vertically-scalable, symmetric multiprocessing (SMP) environments are radically different from their mid-range and blades processor kin.

SPARC International: Open Standards Promote Innovation
Architecture of the SPARC Processor

The SPARC architecture has always been guided by its fundamental design philosophy of open standards: Open to promote innovation, to provide options and flexibility, to encourage fair competition, and to help businesses relying on the SPARC platform thrive.

Rocky Mountain Software Symposium
May 16-18, Denver, Colorado

The Rocky Mountain Software Symposium will offer over 40 sessions on XML, Java 2 Platform, Enterprise Edition (J2EE), Web Services, Agile Methodologies and open source. Some speakers include Ted Neward, Sue Spielman, Glenn Vanderburg and Jason Hunter.

Eunis 2003: July 2-4 in Amsterdam
IT and Academics

Eunis 2003 will be held July 2-4, 2003, at the Universiteit van Amsterdam in Amsterdam. This is the ninth conference of European Univerisity Information Systems (EUNIS). The conference will be a unique opportunity for dialogue between academics and professionals from Information and Communication Technologies (ICT) companies. John Gage, chief researcher and science office director at Sun, is one of the scheduled speakers.

NECC 2003
June 29-July 2 in Seattle, Washington

This year's National Educational Computing Conference (NECC) theme is Visions & Reflections. The conference will evaluate how technology has shaped education and if the needs of future learners changed as a result of technology's influence on society. Workshops will cover meeting NCLB mandates; hands-on training in the latest multimedia, Web, and wireless technologies; productivity and management tools and more.

May Sun User Group Meetings

Sun supports worldwide user groups for a number of software products. These user groups typically hold two, in-person meetings each year where attendees hear directly from the product teams at Sun and have the chance to exchange technical information with peers in other customer organizations. One meeting will be online; the others will be in India and New York.

"The Gradual Maturity of Standards With Time"
Rags Srinivas on the Stepwise Refinement Standards Process

Rags Srinivas, in his technical article "The Gradual Maturity of Standards With Time," reviews the standards process and its strategy of stepwise refinement, which leaves a particular standard improved after each of the steps it is subjected to. He refers also to interoperability testing, often conducted long after a standard is publicly accepted, which can result in yet further modifications.

Improving Translatability With Sun Proof
Sun's Initiatives in Controlled Authoring and Machine Translation

A recent LISA Newsletter article, "Improving Translatability -- A Case Study at Sun Microsystems Inc.," examines Sun's initiatives in controlled authoring and machine translation. With assistance from the Institute of Applied Information Sciences (IAI), the company created Sun Proof technology, which provides improvements in the translatability of source texts for machine translation.

"Configuring the Secure Shell Software"
Sun BluePrints Article on OpenSSH and the Solaris Secure Shell software

The Sun BluePrints OnLine article, "Configuring the Secure Shell Software," offers recommendations on configuring two specific Secure Shell implementations for the Solaris Operating System (Solaris OS): OpenSSH and the Solaris Secure Shell software. The document includes the mechanics of configuration files, general recommendations and client recommendations.

Intruder Detection Checklist
Where to Look for Signs that Your System May Have Been Compromised

The CERT Coordination Center outlines an Intruder Detection Checklist for determining if a UNIX system has been compromised. The information can be used by system administrators to look for several types of break-ins. The document includes ten specific signs of possible compromise, from log files to the local network.

List of Security Tools from CERT Coordination Center
Tools for Network Monitoring, Authentication, Vulnerabilities and More

The CERT Coordination Center has provided a List of Security Tools that can be used to help secure a system and deter break-ins. The list covers a range of tool types, including network monitoring tools, authentication/password tools, tools to help scan hosts for known vulnerabilities and multi-purpose tools.

"A Reverse Proxy Is A Proxy By Any Other Name"
Security Document From the SANS Institute's InfoSec Reading Room

A document from the SANS Institute's InfoSec Reading Room, "A Reverse Proxy is a Proxy by Any Other Name," examines the concept of a reverse proxy along with its infrastructure, pros, cons and implementation. The reverse proxy is one which proxies on behalf of the backend HTTP server, not on behalf of the outside client's request.

Trending in
Vol 234, Issue 3
Trending IT Articles