Choose your java wisely…

Written by Shashank


Continued from page 1

Well, so this “dilemma” is real and has to be looked after (you don’t stand a chance if you don’t). Many a times in java forums, you’ll find beginners withrepparttar problem of “applet not initializing” and whenrepparttar 107665 compiling is targeted for 1.1, it runs. Preferably, developers should haverepparttar 107666 latest version (despiterepparttar 107667 huge bandwidth it’s going to cost you to download it) and they should try and keep their apps designed, if possible, for lower versions for a universal application. Although, this might not necessarily be imposed for a long time, but certainly try and keep your apps designed byrepparttar 107668 java 1.4 specifications for a few weeks, till most ofrepparttar 107669 users catch on withrepparttar 107670 tiger. This should also give you sufficient time to upgrade your programming ability version also. A recent survey about java’s versions had about 260 respondents out of which about 15% didn’t know that java had versions, 8% preferred java asrepparttar 107671 good old java (can’t believe it, me neither), 29% were happy, 32% wanted newer versions but wantedrepparttar 107672 syntax of older versions to remain and onlyrepparttar 107673 bugs being killed andrepparttar 107674 rest were too confused to have an opinion.

On this note, its now entirely up to you to decide which is your cup of java. I’ve just got a book to learn to tamerepparttar 107675 tiger and I’ll be using java 1.4 till I tame 1.5 good. So, I think it’ll be around October, when I start using 1.5 hoping (with crossed fingers) that most ofrepparttar 107676 users by then would be roaring with it.

I hope that this small article would help you make a decision about which version of java to use.

Shashank is the founder and administrator of the java apps rating site - thejavahub.com. To know more about this venture with java, please visit his site at http://www.thejavahub.com


Open Sesame - Password Security

Written by Terrence F. Doheny


Continued from page 1

The human factor or social engineering contributes to password compromises. It is estimated that employees share their password eight times a year. Passwords can also be cajoled from untrained or naïve workers. The standard rule is NEVER share a password. Rememberrepparttar cliché ofrepparttar 107664 “Six Degrees of Separation.” You cannot know who will eventually end up with your password and own it.

To cope with these issues, many leading edge firms are adopting a defense in depth strategy utilizing three elements to better safeguard their information

The three layers of authentication consist of: What you know... A strong password or pass phrase What you have... A Crypto-key, smart card or token Who you are... A biometric aspect such as fingerprint, hand, or retinal recognition

Usage of these three defensive measures will increase dramatically inrepparttar 107665 future as people seek to thwart ever increasing threats to their private and personal information. Many companies will be mandating them as a significant part of their security best- practices to safeguard an extremely valuable asset: their treasured data.

Article written by:

Terrence F. Doheny, President of Beyond If Solutions, LLC. www.beyondifsolutions.com terry@beyondifsolutions.com © Copyright 2004, Terrence F. Doheny, Beyond If Solutions, LLC

Terrence F. Doheny is the President of Beyond If Solutions, LLC. www.beyondifsolutions.com terry@beyondifsolutions.com © Copyright 2004, Terrence F. Doheny, Beyond If Solutions, LLC


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use