JavaServer Pages, Third Edition is completely revised and updated to cover the substantial changes in the 2.0 version of the JSP specification. It also includes detailed coverage of the major revisions to the JSP Standard Tag Library (JSTL) specification. Combining plenty of practical advice with detailed coverage of JSP syntax and features and clear, useful examples, JavaServer Pages, Third Edition demonstrates how to embed server-side Java into Web pages, while also covering important topics such as JavaBeans, Enterprise JavaBeans (EJB), and JDBC database access.
I built the Superlist control whilst developing an RSS reader called FeedGhost. Although there are plenty of commercial grouped list controls available I wanted to have total control over the code and of course its usability. Superlist supports drag drop column customisation, grouping as well as handling thousands of entries smoothly. It s also highly customisable if you want to change its look and feel. In this article I ll explain how to use and extend the control in a demo project. If you download the source, you can find demo project under the Tests/SuperListTest directory.
Expert C Programming: Deep C Secrets
By Peter van der Linden.
Have you ever noticed that there are plenty of C books with suggestive names like C Traps and
Pitfalls, or The C Puzzle Book, or Obfuscated C and Other Mysteries, but other programming
languages don t have books like that? There s a very good reason for this!
If you want to use the Struts Framework to its fullest potential, this is the book for you. Programming Jakarta Struts, 2nd Edition covers everything the successful earlier edition did as well as plenty more: now fully up to date with Struts 1.1, this edition covers the latest material on tag libraries and the new JavaServerFaces (JSF) APIs and even includes all-new chapters on JSF, JSTL/EL, and security.
In general there are three different techniques for performance evaluation of
systems and networks: mathematical analysis, measurements, and computer
simulation. All these techniques have their strength and weaknesses. In the
literature there are plenty of discussions about when to use which technique,
how to apply it, and which pitfalls are related to which evaluation technique.
When 3GPP started standardizing the IMS a few years ago, most analysts expected the
number of IMS deploymentsto grow dramatically as soon the initial IMS specifications were
ready (3GPP Release 5 was functionallyfrozenin the first half of 2002and completedshortly
after that). While those predictions have proven to be too aggressive owing to a number of
upheavals hitting the ICT (Information and Communications Technologies) sector, we are
now seeing more and more commercial IMS-based service offerings in the market. At the
time of writing (May 2008), there are over 30 commercial IMS networks running live traffic,
addingup to over10million IMS users aroundthe world; the IMS is beingdeployedglobally.
In addition, there are plenty of ongoing market activities; it is estimated that over 130 IMS
contracts have been awarded to all IMS manufacturers. The number of IMS users will grow
substantially as these awarded contracts are launched commercially. At the same time, the
number of IMS users in presently deployed networks is steadily increasing as new services
are introduced and operators running these networks migrate their non-IMS users to their
IMS networks.