Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.
Navigating Your IT Career A career in information technology usually has its share of ups and downs. Download this Internet.com eBook to learn where the jobs are in IT, how to negotiate a salary, and helpful advice on job security and how to deal with a layoff. »
Locking Down Your Wireless Network
Changing the default SSID or disabling SSID broadcasting are two of the most popular ways to help secure a wireless network, but by no means do they provide adequate security. Learn how to use encryption, VPNs, and basic laptop and PC security to keep your network and machines safe. »
Evaluating Software as a Service for Your Business
Is Software as a Service just hype, or is something really going on here? And if there is fuel behind these flames, what's different? Why has a model that languished for a decade suddenly gained steam? Download this eBook to see if your company can benefit as SaaS tries to change the face of the enterprise. »
The State of Storage Virtualization
Virtualization has been something of a buzzword in storage for more than half a decade. It is defined in a variety of ways, depending on whom you ask. So what exactly is it? And how should it be implemented? This eBook from our editors at EnterpriseStorageForum.com and Internet.com explores some of the second-generation storage virtualization products from a number of vendors and compares their approaches.
»
Waging the War Against Spam
Businesses spend a whopping $712 per worker, per year, in the battle against spam, but there doesn't seem to be any easy answers to the problem. Download this eBook to see what your IT department can do to reduce the nuisance of spam, and for tips on how your users can help you fight the battle. »
Newest Java Articles New Research on Eclipse Released By Rosemarie Graham - Published 11/15/2007 The results of this report will help you to better understand how individuals are using Eclipse and which business models organizations are adopting software built with Eclipse.
Understanding the Alpha Time-Base Class in Java 3D By Richard G. Baldwin - Published 11/06/2007 Understanding the Alpha class is critical to understanding Java 3D animation. The constructors for the Alpha class can require up to ten parameters. Learn about the detailed behavior of objects instantiated from the Alpha class, with particular emphasis on understanding the behavior imparted by each of the ten parameters.
Application Handling of Database Timeouts and Deadlocks By Aleksey Shevchenko - Published 11/01/2007 Learn how to minimize the occurrence of database transaction locking and how to handle situations when your database does return error codes that constitute deadlocks and timeouts.
Tools, Iterations, and Stories By Jeff Langr - Published 10/29/2007 For all the things that tracking tools and iterations are good for in an agile team, teams should focus on delivering completed business value via stories.
Simple Animation with the Java 3D API By Richard G. Baldwin - Published 10/23/2007 Learn how to use the RotationInterpolator and Alpha classes of the Java 3D API, along with other necessary classes, to write simple animation programs. Also learn the rationale by which those classes are used to write animation programs.
Sun Releases Information on J2SE Vulnerabilities By Rosemarie Graham - Published 10/11/2007 Do you use Java 2 Platform, Standard Edition? One of the 11 areas of vulnerabilities reported this month may effect you.
Maturity Through Standards By Jeff Ryan - Published 10/11/2007 Do architecture standards curtail the creativity of a developer or architect? Or rather, do standards channel creativity into solving business problems? Read on to learn how the presence (or absence) of standards is an indicator of the software development maturity in an organization.
Highlighted Java Tutorials 10 Commandments for Java Developers By Aleksey Shevchenko -
Would you like your life to go much smoother? Follow these rule and you can make it happen.
Ten Aspects of Security to Improve Application Strength By Chad Cook -
Making mistakes when trying to build secure applications can lead to critical flaws and vulnerabilities. Learn how to strengthen an application and avoid costly mistakes.
Programming the Eclipse Workbench By Peter Nehrer -
What makes Eclipse applications most easily recognizable is the Workbench. Explore the Eclipse Workbench parts in detail — specifically the views and editors that make up most Workbench applications.
Ajax with the ZK Framework By Michael Klaene -
Discover how to utilize the ZK Ajax framework to develop web based Java applications with the look and functionality of desktop applications.
Developing Java-Based Mobile Games By Mugdha Chauhan -
With 1.2 billion cell phones in the world, mobile game development has become a lucrative industry. Use your existing Java knowledge to learn mobile development basics while building your first game!
Good Java Style: Part 1 By Thornton Rose -
Worrying about good style may seem like a waste of time, but it behooves us to write our code such that the thoughts and ideas it expresses are exceptionally clear.
J2ME Core Concepts By Eric Giguère -
At the heart of Java 2 Micro Edition (J2ME) are three core
concepts: configurations, profiles, and optional packages.
JXTA for Wireless Java Programmers By Bilal Siddiqui -
Interested in adding J2ME devices in Peer-to-Peer (P2P) computing? This new series will use JXTA as an example P2P network and show why, when, and how to use J2ME as a JXTA peer.